• Title/Summary/Keyword: Edge Computing Model

Search Result 116, Processing Time 0.035 seconds

The Design of Application Model using Manufacturing Data in Protection Film Process for Smart Manufacturing Innovation (스마트 제조혁신을 위한 보호필름 공정 제조데이터의 활용모델 설계)

  • Cha, ByungRae;Park, Sun;Lee, Seong-ho;Shin, Byeong-Chun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.95-103
    • /
    • 2019
  • The global manufacturing industry has reached the limit to growth due to a long-term recession, the rise of labor cost and raw material. As a solution to these difficulties, we promote the 4th Industry Revolution based on ICT and sensor technology. Following this trend, this paper proposes the design of a model using manufacturing data in the protection film process for smart manufacturing innovation. In the protective film process, the manufacturing data of temperature, pressure, humidity, and motion and thermal image are acquired by various sensors for the raw material blending, stirring, extrusion, and inspection processes. While the acquired manufacturing data is stored in mass storage, A.I. platform provides time-series image analysis and its visualization.

Geometrically nonlinear thermo-mechanical analysis of graphene-reinforced moving polymer nanoplates

  • Esmaeilzadeh, Mostafa;Golmakani, Mohammad Esmaeil;Kadkhodayan, Mehran;Amoozgar, Mohammadreza;Bodaghi, Mahdi
    • Advances in nano research
    • /
    • v.10 no.2
    • /
    • pp.151-163
    • /
    • 2021
  • The main target of this study is to investigate nonlinear transient responses of moving polymer nano-size plates fortified by means of Graphene Platelets (GPLs) and resting on a Winkler-Pasternak foundation under a transverse pressure force and a temperature variation. Two graphene spreading forms dispersed through the plate thickness are studied, and the Halpin-Tsai micro-mechanics model is used to obtain the effective Young's modulus. Furthermore, the rule of mixture is employed to calculate the effective mass density and Poisson's ratio. In accordance with the first order shear deformation and von Karman theory for nonlinear systems, the kinematic equations are derived, and then nonlocal strain gradient scheme is used to reflect the effects of nonlocal and strain gradient parameters on small-size objects. Afterwards, a combined approach, kinetic dynamic relaxation method accompanied by Newmark technique, is hired for solving the time-varying equation sets, and Fortran program is developed to generate the numerical results. The accuracy of the current model is verified by comparative studies with available results in the literature. Finally, a parametric study is carried out to explore the effects of GPL's weight fractions and dispersion patterns, edge conditions, softening and hardening factors, the temperature change, the velocity of moving nanoplate and elastic foundation stiffness on the dynamic response of the structure. The result illustrates that the effects of nonlocality and strain gradient parameters are more remarkable in the higher magnitudes of the nanoplate speed.

Proposal of autonomous take-off drone algorithm using deep learning (딥러닝을 이용한 자율 이륙 드론 알고리즘 제안)

  • Lee, Jong-Gu;Jang, Min-Seok;Lee, Yon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.187-192
    • /
    • 2021
  • This study proposes a system for take-off in a forest or similar complex environment using an object detector. In the simulator, a raspberry pi is mounted on a quadcopter with a length of 550mm between motors on a diagonal line, and the experiment is conducted based on edge computing. As for the images to be used for learning, about 150 images of 640⁎480 size were obtained by selecting three points inside Kunsan University, and then converting them to black and white, and pre-processing the binarization by placing a boundary value of 127. After that, we trained the SSD_Inception model. In the simulation, as a result of the experiment of taking off the drone through the model trained with the verification image as an input, a trajectory similar to the takeoff was drawn using the label.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

Modeling of Magnetotelluric Data Based on Finite Element Method: Calculation of Auxiliary Fields (유한요소법을 이용한 MT 탐사 자료의 모델링: 보조장 계산의 고찰)

  • Nam, Myung-Jin;Han, Nu-Ree;Kim, Hee-Joon;Song, Yoon-Ho
    • Geophysics and Geophysical Exploration
    • /
    • v.14 no.2
    • /
    • pp.164-175
    • /
    • 2011
  • Using natural electromagnetic (EM) fields at low frequencies, magnetotelluric (MT) surveys can investigate conductivity structures of the deep subsurface and thus are used to explore geothermal energy resources and investigate proper sites for not only geological $CO_2$ sequestration but also enhanced geothermal system (EGS). Moreover, marine MT data can be used for better interpretation of marine controlled-source EM data. In the interpretation of MT data, MT modeling schemes are important. This study improves a three dimensional (3D) MT modeling algorithm which uses edge finite elements. The algorithm computes magnetic fields by solving an integral form of Faraday's law of induction based on a finite difference (FD) strategy. However, the FD strategy limits the algorithm in computing vertical magnetic fields for a topographic model. The improved algorithm solves the differential form of Faraday's law of induction by making derivatives of electric fields, which are represented as a sum of basis functions multiplied by corresponding weightings. In numerical tests, vertical magnetic fields for topographic models using the improved algorithm overcome the limitation of the old algorithm. This study recomputes induction vectors and tippers for a 3D hill and valley model which were used for computation of the responses using the old algorithm.

A Realtime Expression Control for Realistic 3D Facial Animation (현실감 있는 3차원 얼굴 애니메이션을 위한 실시간 표정 제어)

  • Kim Jung-Gi;Min Kyong-Pil;Chun Jun-Chul;Choi Yong-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.23-35
    • /
    • 2006
  • This work presents o novel method which extract facial region und features from motion picture automatically and controls the 3D facial expression in real time. To txtract facial region and facial feature points from each color frame of motion pictures a new nonparametric skin color model is proposed rather than using parametric skin color model. Conventionally used parametric skin color models, which presents facial distribution as gaussian-type, have lack of robustness for varying lighting conditions. Thus it needs additional work to extract exact facial region from face images. To resolve the limitation of current skin color model, we exploit the Hue-Tint chrominance components and represent the skin chrominance distribution as a linear function, which can reduce error for detecting facial region. Moreover, the minimal facial feature positions detected by the proposed skin model are adjusted by using edge information of the detected facial region along with the proportions of the face. To produce the realistic facial expression, we adopt Water's linear muscle model and apply the extended version of Water's muscles to variation of the facial features of the 3D face. The experiments show that the proposed approach efficiently detects facial feature points and naturally controls the facial expression of the 3D face model.

  • PDF

Remaking Mobile Ecosystem Policies for New Mobile Market (새로운 통신시장 활성화를 위한 모바일 생태계 통신정책)

  • Kwak, Jeong-Ho;Cho, Ji-Yeon;Lee, Yong-Seok;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.93-106
    • /
    • 2011
  • The Korean mobile telecom market has undergone a sea change since Apple created a new mobile ecosystem with Appstore and iPhone. Many non-telecom operators have been trying hard to come up with new business strategies to gain a competitive edge. The shifting competition landscape requires a new communications policy that can further stimulate the evolving market. This is why countries around the world are upgrading their communications policies: to renew the market foundation and better respond to the ever-changing industry environment. Using the ANP(Analytic Network Process) model, this study identifies policy variables and performs quantitative analysis on their priorities. The analysis results will help prioritize policy variables under the limited amount of resources, and serve as useful guidelines for making mobile ecosystem policies.

Security Analysis of the Whirlpool Hash Function in the Cloud of Things

  • Li, Wei;Gao, Zhiyong;Gu, Dawu;Ge, Chenyu;Liao, Linfeng;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.536-551
    • /
    • 2017
  • With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.

Analysis of the Valuation Model for the state-of-the-art ICT Technology (첨단 ICT 기술에 대한 가치평가 모델 분석)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.705-710
    • /
    • 2021
  • Nowadays, cutting-edge information communication technology is the genuine core technology of the fourth Industrial Revolution and is still making great progress rapidly among various technology fields. The biggest issue in ICT fields is the machine learning based Artificial Intelligence applications using big data in cloud computing environment on the basis of wireless network, and also the technology fields of autonomous control applications such as Autonomous Car or Mobile Robot. Since value of the high-tech ICT technology depends on the surrounded environmental factors and is very flexible, the precise technology valuation method is urgently needed in order to get successful technology transfer, transaction and commercialization. In this research, we analyze the characteristics of the high-tech ICT technology and the main factors in technology transfer or commercialization process, and propose the precise technology valuation method that reflects the characteristics of the ICT technology through phased analysis of the existing technology valuationmodel.

Performance Evaluation Using Neural Network Learning of Indoor Autonomous Vehicle Based on LiDAR (라이다 기반 실내 자율주행 차량에서 신경망 학습을 사용한 성능평가 )

  • Yonghun Kwon;Inbum Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.93-102
    • /
    • 2023
  • Data processing through the cloud causes many problems, such as latency and increased communication costs in the communication process. Therefore, many researchers study edge computing in the IoT, and autonomous driving is a representative application. In indoor self-driving, unlike outdoor, GPS and traffic information cannot be used, so the surrounding environment must be recognized using sensors. An efficient autonomous driving system is required because it is a mobile environment with resource constraints. This paper proposes a machine-learning method using neural networks for autonomous driving in an indoor environment. The neural network model predicts the most appropriate driving command for the current location based on the distance data measured by the LiDAR sensor. We designed six learning models to evaluate according to the number of input data of the proposed neural networks. In addition, we made an autonomous vehicle based on Raspberry Pi for driving and learning and an indoor driving track produced for collecting data and evaluation. Finally, we compared six neural network models in terms of accuracy, response time, and battery consumption, and the effect of the number of input data on performance was confirmed.