• Title/Summary/Keyword: IoT server

Search Result 364, Processing Time 0.028 seconds

Real-time Reefer Container Monitoring System based on IoT (IoT 기반 실시간 냉장컨테이너 상태 모니터링 시스템)

  • Moon, Young-Sik;Jung, Jun-Woo;Choi, Sung-Pill;Kim, Tae-Hoon;Lee, Byung-Ha;Kim, Jae-Joong;Choi, Hyung-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.629-635
    • /
    • 2015
  • In this paper, we propose the reefer container monitoring system that not only monitors internal temperature, humidity of reefer container but also tracks the real-time location using GPS. It consists of a tag of information of situation using 433MHz RF transmitter(communication), GPS to track the real-time location and a device using WCDMA/GSM communication to transmit information to the server. We tested by applying the proposed system in reefer containers with yellow melons, melons transported from Korea to Singapore to track the location and check the temperature and the humidity. The result of this test is that there is a temperature difference around 1.7 degree depending on the position of inside of container and maintains the humidity stably about 97%. If we apply this proposed system to agricultural marketing, it is possible to get the time that fruits start to decay and minimize the loss of fruits by decaying during shipping.

Speech Recognition for the Korean Vowel 'ㅣ' based on Waveform-feature Extraction and Neural-network Learning (파형 특징 추출과 신경망 학습 기반 모음 'ㅣ' 음성 인식)

  • Rho, Wonbin;Lee, Jongwoo;Lee, Jaewon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.2
    • /
    • pp.69-76
    • /
    • 2016
  • With the recent increase of the interest in IoT in almost all areas of industry, computing technologies have been increasingly applied in human environments such as houses, buildings, cars, and streets; in these IoT environments, speech recognition is being widely accepted as a means of HCI. The existing server-based speech recognition techniques are typically fast and show quite high recognition rates; however, an internet connection is necessary, and complicated server computing is required because a voice is recognized by units of words that are stored in server databases. This paper, as a successive research results of speech recognition algorithms for the Korean phonemic vowel 'ㅏ', 'ㅓ', suggests an implementation of speech recognition algorithms for the Korean phonemic vowel 'ㅣ'. We observed that almost all of the vocal waveform patterns for 'ㅣ' are unique and different when compared with the patterns of the 'ㅏ' and 'ㅓ' waveforms. In this paper we propose specific waveform patterns for the Korean vowel 'ㅣ' and the corresponding recognition algorithms. We also presents experiment results showing that, by adding neural-network learning to our algorithm, the voice recognition success rate for the vowel 'ㅣ' can be increased. As a result we observed that 90% or more of the vocal expressions of the vowel 'ㅣ' can be successfully recognized when our algorithms are used.

A Study on CPPS Architecture integrated with Centralized OPC UA Server (중앙 집중식 OPC UA 서버와 통합 된 CPPS 아키텍처에 관한 연구)

  • Jo, Guejong;Jang, Su-Hwan;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.73-82
    • /
    • 2019
  • In order to build a smart factory, building a CPPS (Cyber Physical Product System) is an important system that must be accompanied. Through the CPPS, it is the reality of smart factories to move physical factories to a digital-based cyber world and to intelligently and autonomously monitor and control them. But The existing CPPS architectures present only an abstract modeling architecture, and the research that applied the OPC UA Framework (Open Platform Communication Unified Architecture), an international standard for data exchange in the smart factory, as the basic system of CPPS It was insufficient. Therefore, it is possible to implement CPPS that can include both cloud and IoT by collecting field data distributed by CPPS architecture applicable to actual factories and concentrating data processing in a centralized In this study, we implemented CPPS architecture through central OPC UA Server based on OPC UA conforming to central processing OPC UA Framework, and how CPPS logical process and data processing process are automatically generated through OPC UA modeling processing We have proposed the CPPS architecture including the model factory and implemented the model factory to study its performance and usability.

Combing data representation by Sparse Autoencoder and the well-known load balancing algorithm, ProGReGA-KF (Sparse Autoencoder의 데이터 특징 추출과 ProGReGA-KF를 결합한 새로운 부하 분산 알고리즘)

  • Kim, Chayoung;Park, Jung-min;Kim, Hye-young
    • Journal of Korea Game Society
    • /
    • v.17 no.5
    • /
    • pp.103-112
    • /
    • 2017
  • In recent years, expansions and advances of the Internet of Things (IoTs) in a distributed MMOGs (massively multiplayer online games) architecture have resulted in massive growth of data in terms of server workloads. We propose a combing Sparse Autoencoder and one of platforms in MMOGs, ProGReGA. In the process of Sparse Autoencoder, data representation with respect to enhancing the feature is excluded from this set of data. In the process of load balance, the graceful degradation of ProGReGA can exploit the most relevant and less redundant feature of the data representation. We find out that the proposed algorithm have become more stable.

Real-time Intelligent Exit Path Indicator Using BLE Beacon Enabled Emergency Exit Sign Controller

  • Jung, Joonseok;Kwon, Jongman;Jung, Soonho;Lee, Minwoo;Mariappan, Vinayagam;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.82-88
    • /
    • 2017
  • Emergency lights and exit signs are an indispensable part of safety precautions for effective evacuation in case of emergency in public buildings. These emergency sign indicates safe escape routes and emergency doors, using an internationally recognizable sign. However visibility of those signs drops drastically in case of emergency situations like fire smoke, etc. and loss of visibility causes serious problems for safety evacuation. This paper propose a novel emergency light and exit sign built-in with Bluetooth Low Energy (BLE) Beacon to assist the emergency self-guiding evacuation using devices for crisis and emergency management to avoid panic condition inside the buildings. In this approach, the emergency light and exit sign with the BLE beacons deployed in the indoor environments and the smart devices detect their indoor positions, direction to move, and next exit sign position from beacon messages and interact with map server in the Internet / Intranet over the available LTE and/or Wi-Fi network connectivity. The map server generate an optimal emergency exit path according to the nearest emergency exit based on a novel graph generation method for less route computation for each smart device. All emergency exit path data interfaces among three system components, the emergency exit signs, map server, and smart devices, have been defined for modular implementation of our emergency evacuation system. The proposed exit sign experimental system has been deployed and evaluated in real-time building environment thoroughly and gives a good evidence that the modular design of the proposed exit sign system and a novel approach to compute emergency exit path route based on the BLE beacon message, map server, and smart devices is competitive and viable.

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

An Extensional Client Authorization Scheme for IoT Scenarios by Using OAuth 2.0 and PoP Token

  • Xiaonan, Xing;Jang, Sunggyun;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.200-202
    • /
    • 2017
  • To improve the security of OAuth 2.0 access token transportation and satisfy the challenge of resources constraint caused by the bearer token access mechanism of the OAuth 2.0, we proposed an extensional client authentication scheme that is based on the Proof-of-Possession (PoP) token mechanism. By improving the integrity of PoP token, we bind a PoP key of a public/private key pair to the PoP token. The authorization server and the resource server can authenticate the identity of the client by verifying whether the client has the possession of the PoP token. If the client can prove that it has a PoP key that matches the PoP token, then the identity of the client can be authenticated. This experimental evaluation can confirm that this scheme effectively dealing with the issue of client identity authentication and reduce resources consumption.

Development of Context-Aware Power Management Scheme Using Beacons

  • Lee, Kwang Ok;Lee, Seok Min;Jo, Seonghun;Park, Gyeong Ho;Kim, Se-Jin
    • Journal of Integrative Natural Science
    • /
    • v.11 no.1
    • /
    • pp.44-50
    • /
    • 2018
  • In this paper, we propose a context-aware power management (CPM) scheme using beacons to reduce the power consumption of personal computers (PCs). In the proposed CPM scheme, the PC, smartphone, control server, and Internet of Things (IoT) device are necessary. PC users first log in the control server using their smartphones and select PCs to turn on. Then, the selected PCs automatically go into three different modes, i.e., sleep, shutdown, and standby power off modes, in order when the PC users leave the PCs without turning off them. Further, we develop a testbed with the proposed CPM scheme using the Arduino with Bluetooth low energy (BLE) and relay modules. Finally, it is shown that the proposed CPM scheme outperforms the conventional scheme in terms of the power consumption.

A Performance Comparison of Parallel Programming Models on Edge Devices (엣지 디바이스에서의 병렬 프로그래밍 모델 성능 비교 연구)

  • Dukyun Nam
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.165-172
    • /
    • 2023
  • Heterogeneous computing is a technology that utilizes different types of processors to perform parallel processing. It maximizes task processing and energy efficiency by leveraging various computing resources such as CPUs, GPUs, and FPGAs. On the other hand, edge computing has developed with IoT and 5G technologies. It is a distributed computing that utilizes computing resources close to clients, thereby offloading the central server. It has evolved to intelligent edge computing combined with artificial intelligence. Intelligent edge computing enables total data processing, such as context awareness, prediction, control, and simple processing for the data collected on the edge. If heterogeneous computing can be successfully applied in the edge, it is expected to maximize job processing efficiency while minimizing dependence on the central server. In this paper, experiments were conducted to verify the feasibility of various parallel programming models on high-end and low-end edge devices by using benchmark applications. We analyzed the performance of five parallel programming models on the Raspberry Pi 4 and Jetson Orin Nano as low-end and high-end devices, respectively. In the experiment, OpenACC showed the best performance on the low-end edge device and OpenSYCL on the high-end device due to the stability and optimization of system libraries.

A Design of Secure Coding Management System for Efficient Secure Coding Program Operation (효율적인 시큐어코딩 프로그램 운영을 위한 시큐어코딩 관리 시스템 설계 기법)

  • Song, Seokhwa;Kim, Minjin;Yang, SeungMin;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.281-282
    • /
    • 2016
  • 최근 사물인터넷(IoT)이 도래함에 따라 IT 산업을 중심으로 소프트웨어의 활용 용도가 컴퓨터 뿐 아니라, 의료, 교육, 금융, 자동차, 에너지 등 다양한 분야에서 활용되고 있다. 이처럼 소프트웨어 활용 분야가 본격적으로 확산됨에 따라 소프트웨어 보안 취약점을 이용한 공격위험 또한 증가하고 있으며, 이에 따라 시큐어코딩의 중요성이 부각되고 있다. 본 논문에서는 기존 시큐어코딩 관리 시스템 환경에서 효율적인 시큐어코딩 관리를 위해 운영서버와 Program Server를 이용한 시큐어코딩 관리 시스템 향상 방안을 제안한다. 제안하는 시스템을 시큐어코딩 프로그램에 적용한다면, 시큐어코딩 프로그램 성능향상과 효율적인 시큐어코딩 시스템 관리에 도움이 될 것으로 기대된다.