• Title/Summary/Keyword: Network device

Search Result 2,421, Processing Time 0.032 seconds

Regionalized TSCH Slotframe-Based Aerial Data Collection Using Wake-Up Radio (Wake-Up Radio를 활용한 지역화 TSCH 슬롯프레임 기반 항공 데이터 수집 연구)

  • Kwon, Jung-Hyok;Choi, Hyo Hyun;Kim, Eui-Jik
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • This paper presents a regionalized time slotted channel hopping (TSCH) slotframe-based aerial data collection using wake-up radio. The proposed scheme aims to minimize the delay and energy consumption when an unmanned aerial vehicle (UAV) collects data from sensor devices in the large-scale service area. To this end, the proposed scheme divides the service area into multiple regions, and determines the TSCH slotframe length for each region according to the number of cells required by sensor devices in each region. Then, it allocates the cells dedicated for data transmission to the TSCH slotframe using the ID of each sensor device. For energy-efficient data collection, the sensor devices use a wake-up radio. Specifically, the sensor devices use a wake-up radio to activate a network interface only in the cells allocated for beacon reception and data transmission. The simulation results showed that the proposed scheme exhibited better performance in terms of delay and energy consumption compared to the existing scheme.

Development and Usability Evaluation of Hand Rehabilitation Training System Using Multi-Channel EMG-Based Deep Learning Hand Posture Recognition (다채널 근전도 기반 딥러닝 동작 인식을 활용한 손 재활 훈련시스템 개발 및 사용성 평가)

  • Ahn, Sung Moo;Lee, Gun Hee;Kim, Se Jin;Bae, So Jeong;Lee, Hyun Ju;Oh, Do Chang;Tae, Ki Sik
    • Journal of Biomedical Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.361-368
    • /
    • 2022
  • The purpose of this study was to develop a hand rehabilitation training system for hemiplegic patients. We also tried to find out five hand postures (WF: Wrist Flexion, WE: Wrist Extension, BG: Ball Grip, HG: Hook Grip, RE: Rest) in real-time using multi-channel EMG-based deep learning. We performed a pre-processing method that converts to Spider Chart image data for the classification of hand movement from five test subjects (total 1,500 data sets) using Convolution Neural Networks (CNN) deep learning with an 8-channel armband. As a result of this study, the recognition accuracy was 92% for WF, 94% for WE, 76% for BG, 82% for HG, and 88% for RE. Also, ten physical therapists participated for the usability evaluation. The questionnaire consisted of 7 items of acceptance, interest, and satisfaction, and the mean and standard deviation were calculated by dividing each into a 5-point scale. As a result, high scores were obtained in immersion and interest in game (4.6±0.43), convenience of the device (4.9±0.30), and satisfaction after treatment (4.1±0.48). On the other hand, Conformity of intention for treatment (3.90±0.49) was relatively low. This is thought to be because the game play may be difficult depending on the degree of spasticity of the hemiplegic patient, and compensation may occur in patient with weakened target muscles. Therefore, it is necessary to develop a rehabilitation program suitable for the degree of disability of the patient.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

The Effect of Project Based Learning(PBL) Application Using Social Networks on Problem Solving Ability of Occupational Therapy Students (소셜네트워크를 활용한 프로젝트기반학습(PBL) 적용이 작업치료과 대학생의 문제해결능력에 미치는 영향)

  • Lee, Na-Yun;Park, Ju-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.57-65
    • /
    • 2020
  • The purpose of this study is to analyze the problem solving ability of occupational therapy students by applying PBL classes using social networks. Data were collected from 35 students in the third year of occupational therapy at K University from March to June 2019. The results were as follows: First, PBL application using social networks showed a significant improvement in problem solving ability. Seconds, there was a significant difference in problem solving ability according to the preference of mobile device use and major satisfaction. Therefore, as a learning tool for improving the problem-solving ability of occupational therapy students, we proposed a way to increase satisfaction with learning by activating PBL using social networks.

Two-dimensional OCDMA Encoder/Decoder Composed of Double Ring Add/Drop Filters and All-pass Delay Filters (이중 링 Add/Drop 필터와 All-pass 지연 필터로 구성된 이차원 OCDMA 인코더/디코더)

  • Chung, Youngchul
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.3
    • /
    • pp.106-112
    • /
    • 2022
  • A two-dimensional optical code division multiple access (OCDMA) encoder/decoder, which is composed of add/drop filters and all-pass filters for delay operation, is proposed. An example design is presented, and its feasibility is illustrated through numerical simulations. The chip area of the proposed OCDMA encoder/decoder could be about one-third that of a previous OCDMA device employing delay waveguides. Its performance is numerically investigated using the transfer-matrix method combined with the fast Fourier transform. The autocorrelation peak level over the maximum cross-correlation level for incorrect wavelength hopping and spectral phase code combinations is greater than 3 at the center of the correctly decoded pulse, which assures a bit error rate lower than 10-3, corresponding to the forward error-correction limit.

Implementation of Public Address System Using Anchor Technology

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2023
  • A public address (PA) system installed in a building is a system that delivers alerts, announcements, instructions, etc. in an emergency or disaster situation. As for the products used in PA systems, with the development of information and communication technology, PA products with various functions have been introduced to the market. PA systems recently launched in the market may be connected through a single network to enable efficient management and operation, or use voice recognition technology to deliver quick information in case of an emergency. In addition, a system capable of locating a user inside a building using a location-based service and guiding or responding to a safe area in the event of an emergency is being launched on the market. However, the new PA systems currently on the market add some functions to the existing PA system configuration to make system operation more convenient, but they do not change the complex PA system configuration to reduce facility costs, maintenance, and management costs. In this paper, we propose a novel PA system configuration for buildings using audio networks and control hierarchy over peer-to-peer (Anchor) technology based on audio over IP (AoIP), which simplifies the complex PA system configuration and enables convenient operation and management. As a result of the study, through the emergency signal processing algorithm, fire broadcasting was made possible according to the detection of the existence of a fire signal in the Anchor system. In addition, the control device of the PA system was replaced with software to reduce the equipment installation cost, and the PA system configuration was simplified. In the future, it is expected that the PA system using Anchor technology will become the standard for PA facilities.

Integrated Health Monitoring System for Infra-Structure (도시인프라 구조물 건전성 통합 모니터링 시스템)

  • Ju, Seung-Hwan;Seo, Hee-Suk;Lee, Seung-Hwan;Kim, Min-Soo
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.147-155
    • /
    • 2010
  • It often occur to nature disaster that like earthquake, typhoon, etc. around KOREA. A Haiti and Chile also metropolitan area of KOREA occur earthquake. in result, People consider nature disaster. Structures of present age are easily affected by nature disaster. So we are important that warn of dangerous situation as soon as possible. On this study, I introduce Integrated Health Monitoring System for Infra-structure. I develop Structure Health Monitoring System on web-site. Administrator always monitor structure on real-time using internet network. As Administrator using mobile device like PDA, Administrator always monitor structure. As using this system, Damage of nature disaster is minimized and is prevented post damage.

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.