• Title/Summary/Keyword: Lightweight network

검색결과 280건 처리시간 0.185초

Proposal for License Plate Recognition Using Synthetic Data and Vehicle Type Recognition System (가상 데이터를 활용한 번호판 문자 인식 및 차종 인식 시스템 제안)

  • Lee, Seungju;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • 제25권5호
    • /
    • pp.776-788
    • /
    • 2020
  • In this paper, a vehicle type recognition system using deep learning and a license plate recognition system are proposed. In the existing system, the number plate area extraction through image processing and the character recognition method using DNN were used. These systems have the problem of declining recognition rates as the environment changes. Therefore, the proposed system used the one-stage object detection method YOLO v3, focusing on real-time detection and decreasing accuracy due to environmental changes, enabling real-time vehicle type and license plate character recognition with one RGB camera. Training data consists of actual data for vehicle type recognition and license plate area detection, and synthetic data for license plate character recognition. The accuracy of each module was 96.39% for detection of car model, 99.94% for detection of license plates, and 79.06% for recognition of license plates. In addition, accuracy was measured using YOLO v3 tiny, a lightweight network of YOLO v3.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • 제5권4호
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제26권3호
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • 제11권11호
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments (멀티홉 클러스터 센서 네트워크 환경 기반에서 견고한 키 교환)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • 제16권3호
    • /
    • pp.251-260
    • /
    • 2011
  • In this paper, we proposed a scheme that it safely exchanges encrypted keys without Trust Third Party (TTP) and Pre-distributing keys in multi-hop clustering sensor networks. Existing research assume that it exists a TTP or already it was pre-distributed a encrypted key between nodes. However, existing methods are not sufficient for USN environment without infrastructure. Some existing studies using a random number Diffie-Hellman algorithm to solve the problem. but the method was vulnerable to Replay and Man-in-the-middle attack from the malicious nodes. Therefore, authentication problem between nodes is solved by adding a ��TESLA. In this paper, we propose a modified Diffie-Hellman algorithm that it is safe, lightweight, and robust pair-wise agreement algorithm by adding One Time Password (OTP) with timestamp. Lastly, authentication, confidentiality, integrity, non-impersonation, backward secrecy, and forward secrecy to verify that it is safe.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • 제15권5호
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

Implementation of Web services for Slip Data Process (전표데이터 처리를 위한 웹서비스 구현)

  • 황의철;정민영;정선태
    • The Journal of the Korea Contents Association
    • /
    • 제3권2호
    • /
    • pp.57-64
    • /
    • 2003
  • A Web Service is an URL addressable set of functionality that is exposed over a network to serve as a building Hock for creating distributed applications. SOAP is a protocol that Web Service consumers often use, when they request and response to a Web Service, and it is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. A Web Service is very useful forimplementing common functions in especially a large size business area, because it is invoked by a protocol like HTTP or SOAP that we easily use, and by an XML-based data format In this paper, we implement Web Services that process dip data by computers in enterprise accounts in order to enhance the transparency and productivity of enterprises. we analyse the structure of slip data, design dip database, implement stored procedures for manipulating data of slip database, and make thorn controlled by Web Services. The result of this paper will contribute to the standardization and activation of accounting process systems for e-business area.

  • PDF

Detection Algorithm of Road Surface Damage Using Adversarial Learning (적대적 학습을 이용한 도로 노면 파손 탐지 알고리즘)

  • Shim, Seungbo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • 제20권4호
    • /
    • pp.95-105
    • /
    • 2021
  • Road surface damage detection is essential for a comfortable driving environment and the prevention of safety accidents. Road management institutes are using automated technology-based inspection equipment and systems. As one of these automation technologies, a sensor to detect road surface damage plays an important role. For this purpose, several studies on sensors using deep learning have been conducted in recent years. Road images and label images are needed to develop such deep learning algorithms. On the other hand, considerable time and labor will be needed to secure label images. In this paper, the adversarial learning method, one of the semi-supervised learning techniques, was proposed to solve this problem. For its implementation, a lightweight deep neural network model was trained using 5,327 road images and 1,327 label images. After experimenting with 400 road images, a model with a mean intersection over a union of 80.54% and an F1 score of 77.85% was developed. Through this, a technology that can improve recognition performance by adding only road images was developed to learning without label images and is expected to be used as a technology for road surface management in the future.

AIoT-based High-risk Industrial Safety Management System of Artificial Intelligence (AIoT 기반 고위험 산업안전관리시스템 인공지능 연구)

  • Yeo, Seong-koo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제26권9호
    • /
    • pp.1272-1278
    • /
    • 2022
  • The government enacted and promulgated the 'Severe Accident Punishment Act' in January 2021 and is implementing this law. However, the number of occupational accidents in 2021 increased by 10.7% compared to the same period of the previous year. Therefore, safety measures are urgently needed in the industrial field. In this study, BLE Mesh networking technology is applied for safety management of high-risk industrial sites with poor communication environment. The complex sensor AIoT device collects gas sensing values, voice and motion values in real time, analyzes the information values through artificial intelligence LSTM algorithm and CNN algorithm, and recognizes dangerous situations and transmits them to the server. The server monitors the transmitted risk information in real time so that immediate relief measures are taken. By applying the AIoT device and safety management system proposed in this study to high-risk industrial sites, it will minimize industrial accidents and contribute to the expansion of the social safety net.

Design and implementation of trend analysis system through deep learning transfer learning (딥러닝 전이학습을 이용한 경량 트렌드 분석 시스템 설계 및 구현)

  • Shin, Jongho;An, Suvin;Park, Taeyoung;Bang, Seungcheol;Noh, Giseop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2022년도 추계학술대회
    • /
    • pp.87-89
    • /
    • 2022
  • Recently, as more consumers spend more time at home due to COVID-19, the time spent on digital consumption such as SNS and OTT, which can be easily used non-face-to-face, naturally increased. Since 2019, when COVID-19 occurred, digital consumption has doubled from 44% to 82%, and it is important to quickly and accurately grasp and apply trends by analyzing consumers' emotions due to the rapidly changing digital characteristics. However, there are limitations in actually implementing services using emotional analysis in small systems rather than large-scale systems, and there are not many cases where they are actually serviced. However, if even a small system can easily analyze consumer trends, it will help the rapidly changing modern society. In this paper, we propose a lightweight trend analysis system that builds a learning network through Transfer Learning (Fine Tuning) of the BERT Model and interlocks Crawler for real-time data collection.

  • PDF