• Title/Summary/Keyword: Device Network

Search Result 2,407, Processing Time 0.028 seconds

The Effect of Project Based Learning(PBL) Application Using Social Networks on Problem Solving Ability of Occupational Therapy Students (소셜네트워크를 활용한 프로젝트기반학습(PBL) 적용이 작업치료과 대학생의 문제해결능력에 미치는 영향)

  • Lee, Na-Yun;Park, Ju-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.57-65
    • /
    • 2020
  • The purpose of this study is to analyze the problem solving ability of occupational therapy students by applying PBL classes using social networks. Data were collected from 35 students in the third year of occupational therapy at K University from March to June 2019. The results were as follows: First, PBL application using social networks showed a significant improvement in problem solving ability. Seconds, there was a significant difference in problem solving ability according to the preference of mobile device use and major satisfaction. Therefore, as a learning tool for improving the problem-solving ability of occupational therapy students, we proposed a way to increase satisfaction with learning by activating PBL using social networks.

Two-dimensional OCDMA Encoder/Decoder Composed of Double Ring Add/Drop Filters and All-pass Delay Filters (이중 링 Add/Drop 필터와 All-pass 지연 필터로 구성된 이차원 OCDMA 인코더/디코더)

  • Chung, Youngchul
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.3
    • /
    • pp.106-112
    • /
    • 2022
  • A two-dimensional optical code division multiple access (OCDMA) encoder/decoder, which is composed of add/drop filters and all-pass filters for delay operation, is proposed. An example design is presented, and its feasibility is illustrated through numerical simulations. The chip area of the proposed OCDMA encoder/decoder could be about one-third that of a previous OCDMA device employing delay waveguides. Its performance is numerically investigated using the transfer-matrix method combined with the fast Fourier transform. The autocorrelation peak level over the maximum cross-correlation level for incorrect wavelength hopping and spectral phase code combinations is greater than 3 at the center of the correctly decoded pulse, which assures a bit error rate lower than 10-3, corresponding to the forward error-correction limit.

Implementation of Public Address System Using Anchor Technology

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2023
  • A public address (PA) system installed in a building is a system that delivers alerts, announcements, instructions, etc. in an emergency or disaster situation. As for the products used in PA systems, with the development of information and communication technology, PA products with various functions have been introduced to the market. PA systems recently launched in the market may be connected through a single network to enable efficient management and operation, or use voice recognition technology to deliver quick information in case of an emergency. In addition, a system capable of locating a user inside a building using a location-based service and guiding or responding to a safe area in the event of an emergency is being launched on the market. However, the new PA systems currently on the market add some functions to the existing PA system configuration to make system operation more convenient, but they do not change the complex PA system configuration to reduce facility costs, maintenance, and management costs. In this paper, we propose a novel PA system configuration for buildings using audio networks and control hierarchy over peer-to-peer (Anchor) technology based on audio over IP (AoIP), which simplifies the complex PA system configuration and enables convenient operation and management. As a result of the study, through the emergency signal processing algorithm, fire broadcasting was made possible according to the detection of the existence of a fire signal in the Anchor system. In addition, the control device of the PA system was replaced with software to reduce the equipment installation cost, and the PA system configuration was simplified. In the future, it is expected that the PA system using Anchor technology will become the standard for PA facilities.

Integrated Health Monitoring System for Infra-Structure (도시인프라 구조물 건전성 통합 모니터링 시스템)

  • Ju, Seung-Hwan;Seo, Hee-Suk;Lee, Seung-Hwan;Kim, Min-Soo
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.147-155
    • /
    • 2010
  • It often occur to nature disaster that like earthquake, typhoon, etc. around KOREA. A Haiti and Chile also metropolitan area of KOREA occur earthquake. in result, People consider nature disaster. Structures of present age are easily affected by nature disaster. So we are important that warn of dangerous situation as soon as possible. On this study, I introduce Integrated Health Monitoring System for Infra-structure. I develop Structure Health Monitoring System on web-site. Administrator always monitor structure on real-time using internet network. As Administrator using mobile device like PDA, Administrator always monitor structure. As using this system, Damage of nature disaster is minimized and is prevented post damage.

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

ZigBee Authentication Protocol with Enhanced User Convenience and Safety (사용자 편의성 및 안전성이 강화된 ZigBee 인증 프로토콜)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.81-92
    • /
    • 2022
  • The rapidly growing IoT market is expanding not only in general households but also in smart homes and smart cities. Among the major protocols used in IoT, ZigBee accounts for more than 90% of the smart home's door lock market and is mainly used in miniaturized sensor devices, so the safety of the protocol is very important. However, the device using Zig Bee is not satisfied with the omnidirectional safety because it uses a fixed key during the authentication process that connects to the network, and it has not been resolved in the recently developed ZigBee 3.0. This paper proposes a design method that provides omnidirectional safety to the ZigBee authentication protocol and can be quickly applied to existing protocols. The proposed improved ZigBee authentication protocol analyzed and applied the recently developed OWE protocol to apply ECDH, which has low computational volume and provides omnidirectional safety in IoT. Based on this, it provides the safety of the ZigBee authentication protocol, and it is expected that it will be able to provide user convenience as it does not require a separate certificate or password input.