• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.027 seconds

A Way of Unusual Gait Cognition for Life Safety (생활안전 보장을 위한 보행자의 비정상 걸음 인지 방안)

  • Kim, Su-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.215-222
    • /
    • 2016
  • Research on gait recognition and its use is actively underway. This study suggests a method to recognize abnormal gaits of pedestrians. The purposes of the existing research to recognize normal steps are to measure physical activities and to validate people by their walks, but the purpose to recognize abnormal steps in this study is to insure the safe life of pedestrians. There are situations in which pedestrians are unaware of themselves vulnerable and can not ask for help. The purpose of this research is that even if pedestrians are unaware of themselves and there are no spontaneous requests for helps, it is intended for them to escape from dangers and difficulties by adopting the recent IOT technology. Hence, this study analyzes normal pace of pedestrians using the triaxial acceleration sensors, and takes ranges of their normal walking. And then, the steps of pedestrians are measured using the triaxial acceleration sensors, contrasted with their normal walking ranges, and determine whether their steps are normal or not. When it is out of the state for normal paces, a method to determine as abnormal paces is suggested.

Characterization of photonic quantum ring devices manufactured using wet etching process (습식 식각 공정을 이용하여 제작된 광양자테 소자의 특성 분석)

  • Kim, Kyoung-Bo;Lee, Jongpil;Kim, Moojin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.28-34
    • /
    • 2020
  • A structure in which GaAs and AlGaAs epilayers are formed with a metal organic chemical vapor deposition equipment on a GaAs wafer similar to the structure of making a vertical cavity surface emitting laser is used. Photonic Quantum Ring (PQR) devices that are naturally generated by 3D resonance are manufactured by chemically assisted ion beam etching technology, which is a dry etching method. A new technology that can be fabricated has been studied, and as a result, the possibility of wet etching of a solution containing phosphoric acid, hydrogen peroxide and methanol was investigated, and the device fabrication by applying this method are also discussed. In addition, the spectrum of the fabricated optical device was measured, and the results were theoretically analyzed and compared with the wavelength value obtained by the measurement. It is expected that the PQR device will be able to model cells in a three-dimensional shape or be applied to the display field.

Design of OTA Circuit for Current-mode FIR Filter (Current-mode FIR Filter 동작을 위한 OTA 회로 설계)

  • Yeo, Sung-Dae;Cho, Tae-Il;Shin, Young-Chul;Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.7
    • /
    • pp.659-664
    • /
    • 2016
  • In this paper, we suggest operational trans-conductance amplifier(OTA) for current-mode FIR filter that can be used in a digital circuit system requiring high operating frequency and low power consumption. The current-mode signal processing is one of the very innovative design method for a low power consumption system with high operating frequency because it shows a constant power regardless of frequency. From the simulation result using 0.35um CMOS process, when Vdd is 2V, it is confirmed that the proposed circuit showed the dynamic range of the about 1V, about 50% of supply voltage and output current swing of about 0~200uA. Also, the power consumption was evaluated with about 21uW and the active size for an integration was measured with $71um{\times}166um$.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Design of Smart Digital Door Lock System Using Heterogeneous Communication (이종 통신을 이용한 스마트 디지털 도어락 시스템 설계)

  • Han, Yong-Sik;Cho, Hyun-Chul;Park, Jin-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • In this paper, we propose smart digital door lock system using heterogeneous communication. This system has efficient function using RF communication and Internet communication, and realizes access and real image of the passengers by combining camera control technology to secure original competitiveness with existing products. It uses the Internet of things and receive images to and from your smart-phone. And senses human behavior. In the simulated results, the image transmission rate of 90 % or more and the time required to transmit 10,000 images have an average transmission speed of 3 seconds. It is expected to secure competitiveness to increase the security of door lock in the future by enabling minimum security and fire monitoring service in real time.

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

A Study on the Multi-Laser Image Tracking Method using the Latest Approach Angle (최근접 각도를 이용한 복수 레이저 영상 추적 방법 연구)

  • Jo, Jin-Pyo;Ko, Ho-Jeong;Kim, Jeong-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2020
  • The paper proposed the method of calculating the latest approach angle that can reliably recognize multiple laser images even with the change in separation distance between screen and laser launch device. This method recognizes the angle of the laser pattern angle by using the distance of the laser pattern angle, and the angle extraction of the laser detects the laser image from the acquired image using the labeling algorithm, and performs the huff conversion to extract the angle of the straight line. The distance of the reference angle and angle of the laser image extracted using Euclidean distance among similarity scales is calculated, and the furnace is recognized using the calculated distance result value. Experiments with changing the separation distance to "200 cm to 400 cm" showed 100% recognition of individual strands at all separation distances. The experiment confirmed the reliability of the proposed method.

A study on stock price prediction system based on text mining method using LSTM and stock market news (LSTM과 증시 뉴스를 활용한 텍스트 마이닝 기법 기반 주가 예측시스템 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.223-228
    • /
    • 2020
  • The stock price reflects people's psychology, and factors affecting the entire stock market include economic growth rate, economic rate, interest rate, trade balance, exchange rate, and currency. The domestic stock market is heavily influenced by the stock index of the United States and neighboring countries on the previous day, and the representative stock indexes are the Dow index, NASDAQ, and S & P500. Recently, research on stock price analysis using stock news has been actively conducted, and research is underway to predict the future based on past time series data through artificial intelligence-based analysis. However, even if the stock market is hit for a short period of time by the forecasting system, the market will no longer move according to the short-term strategy, and it will have to change anew. Therefore, this model monitored Samsung Electronics' stock data and news information through text mining, and presented a predictable model by showing the analyzed results.

Accelerated Large-Scale Simulation on DEVS based Hybrid System using Collaborative Computation on Multi-Cores and GPUs (멀티 코어와 GPU 결합 구조를 이용한 DEVS 기반 대규모 하이브리드 시스템 모델링 시뮬레이션의 가속화)

  • Kim, Seongseop;Cho, Jeonghun;Park, Daejin
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.1-11
    • /
    • 2018
  • Discrete event system specification (DEVS) has been used in many simulations including hybrid systems featuring both discrete and continuous behavior that require a lot of time to get results. Therefore, in this study, we proposed the acceleration of a DEVS-based hybrid system simulation using multi-cores and GPUs tightly coupled computing. We analyzed the proposed heterogeneous computing of the simulation in terms of the configuration of the target device, changing simulation parameters, and power consumption for efficient simulation. The result revealed that the proposed architecture offers an advantage for high-performance simulation in terms of execution time, although more power consumption is required. With these results, we discovered that our approach is applicable in hybrid system simulation, and we demonstrated the possibility of optimized hardware distribution in terms of power consumption versus execution time via experiments in the proposed architecture.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.