• Title/Summary/Keyword: communication module

Search Result 2,089, Processing Time 0.029 seconds

Pedestrian and Vehicle Distance Estimation Based on Hard Parameter Sharing (하드 파라미터 쉐어링 기반의 보행자 및 운송 수단 거리 추정)

  • Seo, Ji-Won;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • Because of improvement of deep learning techniques, deep learning using computer vision such as classification, detection and segmentation has also been used widely at many fields. Expecially, automatic driving is one of the major fields that applies computer vision systems. Also there are a lot of works and researches to combine multiple tasks in a single network. In this study, we propose the network that predicts the individual depth of pedestrians and vehicles. Proposed model is constructed based on YOLOv3 for object detection and Monodepth for depth estimation, and it process object detection and depth estimation consequently using encoder and decoder based on hard parameter sharing. We also used attention module to improve the accuracy of both object detection and depth estimation. Depth is predicted with monocular image, and is trained using self-supervised training method.

A Method of Generating Code Implementation Model for UML State Diagrams (UML 상태 다이어그램을 위한 코드 구현 모델의 생성 방법)

  • Kim, Yun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1509-1516
    • /
    • 2022
  • This paper presents a method to generate a model of the code implementation for UML state diagrams. First, it promotes the states of a state machine into objects, and then it structures the behavior model on the mechanism of a state diagram based on State design pattern. Then, it establishes the rules of generating the code implementation, and using the rules, the Java code mode is generated for the implementations of State Diagrams in Java syntax grammar. In addition, Structuring the information of the code model is necessary for generating Java code automatically. The meta information is composed of Meta-Class Model and Meta-Behavior Model, on which we could construct the automatic code generating engine for UML State Diagrams. The implementation model generation method presented in this paper could be used as a stand-alone engine, or included and integrated as a module in the UML tools.

A Design of Growth Measurement System Considering the Cultivation Environment of Aquaponics (아쿠아포닉스의 생육 환경을 고려한 성장 측정 시스템의 설계)

  • Hyoun-Sup, Lee;Jin-deog, Kim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.27-33
    • /
    • 2023
  • Demands for eco-friendly food materials are increasing rapidly because of increased interest in well-being and health care, deterioration of air quality due to fine dust, and various soil and water pollution. Aquaponics is a system that can solve various problems such as economic activities, environmental problems, and safe food provision of the elderly population. However, techniques for deriving the optimal growth environment should be preceded. In this paper, we intend to design an intelligent plant growth measurement system that considers the characteristics of existing aquaponics. In particular, we would like to propose a module configuration plan for learning data and judgment systems when providing a uniform growth environment, focusing on designing systems suitable for production sites that do not have high-performance processing resources among intelligent aquaponics production management modules. It is believed that the proposed system can effectively perform deep learning with small analysis resources.

Design and Implementation of Home IoT Cultivation System with iOS Interface (iOS 인터페이스를 지원하는 가정용 IoT 재배 시스템 설계 및 구현)

  • Jeong, Seung Gyun;Kim, Gyu Dong;Kim, Byeong Chang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.61-68
    • /
    • 2023
  • Demand for "pet plants" and "planteriers" is increasing due to the increase in COVID-19 and fine dust. In this paper, Smart pots for planterior should be small in size while providing the functions for cultivation without any problems. They should provide a user interface for long-range control for user's convenience. We implemented smart pots by incorporating IoT into pots. In response to the growing number of iPhone users, we developed an iOS app for user interface and UX/UI design. By communicating with the smartphone app and a home pot server over the Internet, users can check and control the state of the pot anytime, anywhere. The server and the pot module were separated to reduce the size of the pot itself. By locating a water bottle at the bottom of the pot, we expect that it is suitable for a "planterier" because it adopts a circulating structure in which drainage flows down to the water bottle as it is.

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV (보안 UAV를 위한 암호모듈의 성능평가와 보안성 평가 방법에 대한 연구)

  • Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.737-750
    • /
    • 2022
  • The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.

A Fundamental Study on Structure Health Monitoring System Based on Energy Harvesting of Harbour Structure (자가발전기반 항만 구조물 건전성 모니터링 시스템에 대한 기초연구)

  • Jong-Hwa Yi;Seung-Hyeon Lee;Young-seok Kim;Chul Park
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.847-860
    • /
    • 2022
  • Purpose: The purpose of this paper is to present a basic study on the development of a self-generation infrastructure for monitoring the health of harbour structures. Method: By developing a self-generation system and fiber optic sensors for seawater, the study provides basic research data on port structure health monitoring. Result: Through sunlight simulation analysis, 4-5 hours of sunlight can be secure in the domestic environment. Through this, the optical splitter (Introgate) that collects the raw data from the FBG sensor applicable to seawater, the MCU that calculates it, the IoT module with wireless communication functionality, the monitoring server and the supply system are set up. Conclusion: Monitoring port structures directly with fiber optic probes (FBG) and the possibility of using selfpowered systems were confirmed.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Self-powered wireless bus information and disaster information system based on Internet of Things (IoT) (사물인터넷 기반의 자가 전력을 이용한 무선 버스 정보 및 재난 정보 시스템)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.17-22
    • /
    • 2022
  • This paper is a study on the self-powered wireless bus information and disaster information system based on Internet of Things (IoT). The existing bus information system supplies power and communication by cable, which causes a problem of increased installation cost and limited installation site due to cable burial. To solve this problem, a self-powered wireless bus information and disaster information system was proposed. The proposed system provides bus arrival information. Furthermore, in the event of a disaster such as a natural disaster, it can also reduce confusion and damage by notifying the disaster information through the system's speaker. In this study, a self-powered system using a solar module was proposed. As data are transmitted and received through wireless WiFi or LTE, the installation cost can be reduced and the problem of installation location restrictions can be solved.

Implementation of Autonomous Vehicle Situational Awareness Technology using Infrastructure Edge on a Two- way Single Lane in Traffic-isolated Area (교통소외지역 양방향 단일차선에서 인프라 엣지를 이용한 자율주행 차량 상황 인지 기술 구현)

  • Seongjong Kim;Seokil Song
    • Journal of Platform Technology
    • /
    • v.11 no.6
    • /
    • pp.106-115
    • /
    • 2023
  • In this paper, we propose a sensor data sharing system for the safe and smooth operation of autonomous vehicles on two-way single lanes in traffic-isolated areas and implement the core module, the situational awareness technology. Two-way single lanes pose challenges for autonomous vehicles, particularly when encountering parked vehicles or oncoming traffic, leading to reversing issues. We introduce a system using infrastructure cameras to detect vehicles' approach, enter, and leave on twoway single lanes in real-time, transmitting this information to autonomous vehicles via V2N communication, thereby expanding the sensing range of the autonomous vehicles. The core part of the proposed system is the situational awareness of the two-way single lane using infrastructure cameras. In this paper, we implement this using object detection and tracking technology. Finally, we validate the implemented situational awareness technology using data collected from actual two-way single lanes.

  • PDF

A Design and Implementation of Online Exhibition Application for Disabled Artists

  • Seung Gyeom Kim;Ha Ram Kang;Tae Hun Kim;Jun Hyeok Lee;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.77-84
    • /
    • 2024
  • In this paper, we design and implement an online exhibition application based on an Android platform that can showcase the artistic works of disabled artists. This application considers user convenience for disabled artists, particularly providing STT(Speech-to-Text) and TTS(Text-to-Speech) features for visually and hearing impaired individuals. Additionally, for the exhibition of works by disabled artists, the application implements disability certification during registration using disability certificates and registration numbers, ensuring that only authenticated disabled artists can exhibit their works. The database storing personal information of disabled artists and information about art pieces is implemented using MySQL. The server module utilizes RestAPI to transmit data in Json format. To address the large data size of art piece information, it is stored using Firebase Storage, eliminating data size limitations on the server. This application can alleviate issues such as a lack of exhibition space for disabled artists and a lack of communication with the general public.