• Title/Summary/Keyword: communication devices

Search Result 4,042, Processing Time 0.034 seconds

Microcode based Controller for Compact CNN Accelerators Aimed at Mobile Devices (모바일 디바이스를 위한 소형 CNN 가속기의 마이크로코드 기반 컨트롤러)

  • Na, Yong-Seok;Son, Hyun-Wook;Kim, Hyung-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.355-366
    • /
    • 2022
  • This paper proposes a microcode-based neural network accelerator controller for artificial intelligence accelerators that can be reconstructed using a programmable architecture and provide the advantages of low-power and ultra-small chip size. In order for the target accelerator to support various neural network models, the neural network model can be converted into microcode through microcode compiler and mounted on accelerator to control the operators of the accelerator such as datapath and memory access. While the proposed controller and accelerator can run various CNN models, in this paper, we tested them using the YOLOv2-Tiny CNN model. Using a system clock of 200 MHz, the Controller and accelerator achieved an inference time of 137.9 ms/image for VOC 2012 dataset to detect object, 99.5ms/image for mask detection dataset to detect wearing mask. When implementing an accelerator equipped with the proposed controller as a silicon chip, the gate count is 618,388, which corresponds to 65.5% reduction in chip area compared with an accelerator employing a CPU-based controller (RISC-V).

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

IoT based Cleaner Control System using Smart Devices

  • Ye Ho Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.1-8
    • /
    • 2023
  • In this paper, we implement a control system for an IoT-based backpack type vacuum cleaner using a smart device such as a smart phone or smart watch. The implementation system consists of control module produces, control module programming, and smart device programming. The control module is made of Arduino Nano, HM-10 BLE(Bluetooth Low Energy) module and relays as basic parts. The smart device exchanges signals with the control module via bi-directional BLE communication, which allows it to control the start/stop of the vacuum cleaner. Backpack type vacuum cleaners are effective for cleaning high places that require the use of ladders. However, it is often necessary to take off the backpack type cleaner to start/stop it. The IoT-based vacuum cleaner control system implemented in this paper fundamentally solves the problem by allowing users to control the start/stop of the vacuum cleaner without taking it off.

A DEVELOPMENT OF INTELLIGENT CONSTRUCTION LIFT-CAR TOOLKIT DEVICE FOR CONSTRUCTION VERTICAL LOGISTICS MANAGEMENT

  • Chang-Yeon Cho;Soon-Wook Kwon;Tae-Hong Shin;Sang-Yoon Chin;Yea-Sang Kim;Joo-Hyung Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.242-249
    • /
    • 2009
  • High-rise construction sites, especially those situated in spatially constrained urban areas, have difficulties in timely delivery of materials. Modern techniques such as Just-in-time delivery, and use of information technology such as Project Management Information System (PMIS), are targeted to improve the efficiency of the logistics. Such IT-driven management techniques can be further benefited from state-of-the-art devices such as Radio Frequency Identification (RFID) tags and Ubiquitous Sensor Networks (USN), which has resulted in notable achievements in automated logistics management at the construction sites. Based on those achievements, this research develops USN hardware toolkits for construction lifts, which aims to be automated the vertical material delivery by sensing the material information and routing it automatically to the right place. The gathered information from the sensors can also be used for monitoring the overall status. The developed system will be tested in the actual high-rise construction sites to assess the system's feasibility. The proposed system is being implemented using Zigbee communication modules and RFID sensor networks which will communicate with the intelligent palette system (previously developed by the authors). To support the system, a lift-mountable intelligent toolkit is under development. Its feasibility test will be conducted by applying the implemented system to a test bed and then analyzing efficiency of the system and the toolkit. The collected test data will be provided as a basis of autonomous vertical transport equipment development. From this research, efficient management of the material lift is expected with increased accuracy, as well as better management of overall construction schedule benefited from the system. Further research will be expected to develop a smart construction lift, which will eliminate the need for human supervision, thus enabling a real 'autonomous' operation of the system.

  • PDF

Clustering Triangular Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 삼각 클러스터링 라우팅 기법)

  • Nurhayati, Nurhayati;Lee, Kyung Oh;Choi, Sung Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.913-916
    • /
    • 2010
  • Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In BCDCP, all sensors send data from CH (Cluster Head) and then to BS (Base Station). BCDCP works well in small-scale network but in large scale network it is not appropriated since it uses much energy for long distance wireless communication. We propose a routing protocol - Triangular Clustering Routing Protocol (TCRP) - to prolong network life time through the balanced energy consumption. TCRP selects cluster head of triangular shape. The sensor field is divided into energy level and in every level we choose one node as a gate node. This gate node collects data and sends it to the leader node. Finally the leader node sends the aggregated data to the BS. We show TCRP outperforms BCDCP with several experiments.

AIoT-based High-risk Industrial Safety Management System of Artificial Intelligence (AIoT 기반 고위험 산업안전관리시스템 인공지능 연구)

  • Yeo, Seong-koo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.168-170
    • /
    • 2022
  • The government enacted and promulgated the 'Severe Accident Punishment Act' in January 2021, and is enforcing the law for workplaces with 50 or more full-time workers. However, the number of industrial accident accidents in 2021 increased by 10.7% compared to the same period of the previous year, and chemical gas Safety accidents due to leaks and explosions also occur frequently. Therefore, in high-risk industrial sites, comprehensive Safety measures are urgently needed. In this study, BLE Mesh networking in industrial sites with poor communication environment apply technology. The complex sensor AIoT device recognizes a dangerous situation as a gas sensing value, voice, and motion value, and transmits it to the server. The server monitors the risk situation in real time through information value analysis and judgment through artificial intelligence LSTM algorithm and CNN algorithm for AIoT transmission information. Through this study, through the development of AIoT devices capable of gas sensing, voice and motion recognition, and AI-applied safety management systems, It will contribute to the expansion of the social safety net by expanding its application.

  • PDF

Review of Domestic Sleep Industry Classification Criteria and Aanalysis of characteristics of related companies

  • Yu, Tae Gyu
    • International journal of advanced smart convergence
    • /
    • v.11 no.1
    • /
    • pp.111-116
    • /
    • 2022
  • After COVID-19, the number of people with sleep disorders around the world is increasing. In particular, in the flow of the 4th industrial revolution, the differentiation of types and characteristics of the sleep industry is accelerating. Therefore, in this study, the characteristics of each type of sleep-related industry were reclassified from an industrial point of view, and based on this, an attempt was made to review the classification system that can help companies develop sleep products and improve related national systems. Based on the 10th standard industry classification, we compared input cost, value, and usability and analyzed common characteristics, treatments, and preventive effects based on this. A comprehensive taxonomy using matrix analysis was reviewed. As a result, in terms of cost (A), the most common sleeping products are general mattresses and general bedding. It is an IOT device (auxiliary device), and the value aspect (B, B/D) included sleep cafe, bedding rental and management service, and sleep consulting. In terms of utility (A/B), a total of 6 product groups including sleep aids (health functional foods) belong to this category, and in terms of treatment (A/C), a total of 3 product groups including sleep clinics (medical services) belong to this category. As for the product group (A/D) with both properties, it was found that non-insurance sleep treatment medical devices, sleep-related over-the-counter drugs, and some sleep monitoring applications belong to this category. Ultimately, it was found that the sleep industry classification enables the most active product development and composition according to the relative relationship between cost and utility, and treatment and utility. appeared to be necessary.

The Media Pole Design Applying the Playfulness of Scribbling (낙서의 유희성을 반영한 '미디어 폴' 디자인)

  • Kim, Hee Eun;Ryoo, Han Young
    • Design Convergence Study
    • /
    • v.14 no.5
    • /
    • pp.103-115
    • /
    • 2015
  • This study sheds light on the entertaining aspects of Media Pole that is located in Gangnam U-Street and proposes design that considers the aspects of the form, experience, contents and communication of scribbling. Functioning as public digital media, Media Pole provides various convenient services related to the area. According to the research on user's behavior upon Media Pole, photo related services, which can be categorized as entertainment, were found to be the most frequently used services among various services. Taking user's behaviors into consideration, this study highlights the entertaining aspects of Media Pole and suggests design that applies the playfulness of scribbling. The playful characteristics of scribbling were applied to the Media Pole's user interface, interaction, application and interlocking functions. As a result, users are expected to increase as Media Pole becomes more playful than before. Since scribbling is an act of intrinsic human's desire, it will attract users to participate more voluntarily. It can be applied not only to Media Pole, but to any public digital media devices.

A Study on the ICT-based Disability Evaluation Applications for Special Needs Education (특수 교육을 위한 ICT 기반의 장애 평가 애플리케이션 연구)

  • Jeong, Jongmun;Jung, Daeyoung;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.889-899
    • /
    • 2017
  • Various efforts and technical development for integrating the ICT technologies to the area of special needs education have been continuing. In this paper we have studied and implemented various ICT-based disability evaluation websites and mobile applications for special needs education and also verified their usefulness from the field test at disability schools. The valuer can access the websites and mobile applications for autistic behavior or learning disability evaluation at the any places and by any devices such as laptop, PC, smartphone and tablet PC. And all the evalation results are stored into and managed at the server database and shared with websites and mobile applications to integrate together easily. From the study about disability evaluation and implementation results we have a confidence that they will be useful to support the seamless evaluation and the continuous monitoring services for the disabled at the special needs education fields.