• Title/Summary/Keyword: computer access

Search Result 3,150, Processing Time 0.028 seconds

Image Processing System based on Deep Learning for Safety of Heat Treatment Equipment (열처리 장비의 Safety를 위한 딥러닝 기반 영상처리 시스템)

  • Lee, Jeong-Hoon;Lee, Ro-Woon;Hong, Seung-Taek;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.77-83
    • /
    • 2020
  • The heat treatment facility is in a situation where the scope of application of the remote IOT system is expanding due to the harsh environment caused by high heat and long working hours among the root industries. In this heat treatment process environment, the IOT middleware is required to play a pivotal role in interpreting, managing and controlling data information of IoT devices (sensors, etc.). Until now, the system controlled by the heat treatment remotely was operated with the command of the operator's batch system without overall monitoring of the site situation. However, for the safety and precise control of the heat treatment facility, it is necessary to control various sensors and recognize the surrounding work environment. As a solution to this, the heat treatment safety support system presented in this paper proposes a support system that can detect the access of the work manpower to the heat treatment furnace through thermal image detection and operate safely when ordering work from a remote location. In addition, an OPEN CV-based deterioration analysis system using DNN deep learning network was constructed for faster and more accurate recognition than general fixed hot spot monitoring-based thermal image analysis. Through this, we would like to propose a system that can be used universally in the heat treatment environment and support the safety management specialized in the heat treatment industry.

Design and implementation of an AI-based speed quiz content for social robots interacting with users (사람과 상호작용하는 소셜 로봇을 위한 인공지능 기반 스피드 퀴즈 콘텐츠의 설계와 구현)

  • Oh, Hyun-Jung;Kang, A-Reum;Kim, Do-Yun;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.611-618
    • /
    • 2020
  • In this paper, we propose a design and implementation method of speed quiz content that can be driven by a social robot capable of interacting with humans, and a method of developing an intelligent module necessary for implementation. In addition, we propose a method of implementing speed quiz content through the process of constructing a map by arranging and connecting intelligent module blocks. Recently, software education has become mandatory and interest in programming is increasing. However, programming is difficult for students without basic knowledge of programming languages to directly access, and interest in block-type programming platforms suitable for beginners is growing. The block-type programming platform used in this paper is a platform that supports immediate and intuitive programming by supporting interactions between humans and robots. In this paper, the intelligent module implemented for the speed quiz content was used by blocking it within a block-type programming platform. In order to implement the scenario of the speed quiz content proposed in this paper, we implement a total of three image-based artificial intelligence modules. In addition to the intelligent module, various functional blocks were placed to implement the speed quiz content. In this paper, we propose a method of designing a speed quiz content scenario and a method of implementing an intelligent module for speed quiz content.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A novel power trace aligning method for power analysis attacks in mobile devices (모바일 기기에서의 전력 분석 공격을 위한 새로운 전력 신호 정렬 방법)

  • Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.153-166
    • /
    • 2011
  • Recent trends in mobile device market whose services are rapidly expanding to provide wireless internet access are drawing people's attention to mobile security. Especially, since threats to information leakage are reaching to the critical level due to the frequent interchange of important data such as personal and financial information through wireless internet, various encryption algorithms has been developed to protect them. The encryption algorithms confront the serious threats by the appearance of side channel attack (SCA) which uses the physical leakage information such as timing, and power consumption, though the their robustness to threats is theoretically verified. Against the threats of SCA, researches including the performance and development direction of SCA should precede. Among tile SCA methods, the power analysis (PA) attack overcome this misalignment problem. The conventional methods require large computational power and they do not effectively deal with the delay changes in a power trace. To overcome the limitation of the conventional methods, we proposed a novel alignment method using peak matching. By computer simulations, we show the advantages of the proposed method compared to the conventional alignment methods.

Operation of a 3-Year Training Program for Elementary and Secondary Administrators to Foster Creative Convergence Talent (창의융합 인재 양성을 위한 3년간의 초·중등 관리자 연수 프로그램 운영)

  • Jung, Yujin;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.177-186
    • /
    • 2021
  • The 2015 revised curriculum is structured around the core competencies of the 21st century, this is in line with the world's flow of education, such as OECD Education 2030. A future practical leading model was studied to provide a variety of creative teaching and learning experiences to elementary and Secondary students using intelligent information technology to cultivate core competencies such as ICT and computing thinking. In order for this practical model to stably settle the school field, the training was planned and operated to strengthen the creative convergence education capacity required by the teachers at the unit school through various types of the training. In particular, a nationwide administrators training program was operated for three years, reflecting the new curriculum, teaching and learning methods, and evaluation that can lead to future convergence talent training. In this paper, the perception of creative convergence education was investigated and analyzed considering the influence that administrators may have on the school field. Based on this, through the three-year operation results of the training, it was intended to establish a new training method for stable access to future creative convergence education under the post-corona era's social issues.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

A Cooperative Security Gateway cooperating with 5G+ network for next generation mBcN (차세대 mBcN을 위한 5G+ 연동보안게이트웨이)

  • Nam, Gu-Min;Kim, Hyoungshick;Lee, Hyun-Jin;Cho, Hark-Su
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.129-140
    • /
    • 2021
  • The next generation mBcN should be built to cooperate with the wireless network to support hyper-speed and hyper-connectivity. In this paper, we propose a network architecture for the cooperation mBcN and 5G commercial network and architecture of the cooperative security gateway required for the cooperation. The proposed cooperative security gateway is between gNB and UPF to support LBO, SFC, and security. Our analysis shows that the proposed architecture has several advantages. First of all, user equipment connected with the mBcN can be easily connected through the 5G commercial radio network to the mBcN. Second, the military application traffic can be transmitted to mBcN without going through the 5G core network, reducing the end-to-end transmission delay without causing the traffic load on the 5G core network. In addition, the security level of the military application can effectively be maintained because the user equipment can be connected to the cooperative security gateway, and the traffic generated by the user equipment is transmitted to the mBcN without going through the 5G core network. Finally, we demonstrate that LBO, SFC, and security modules are essential functions of the proposed gateway in the 5G test-bed environment.

Analysis of Operation System Establishment Cases for Efficient use of Risk Assessment at Construction Sites - H Focusing on Construction Company Cases (건설현장의 위험성평가 효율적 활용을 위한 운영 시스템 구축사례 분석 - H 건설사 사례중심으로)

  • Jae-Bung Lee
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.828-838
    • /
    • 2022
  • Purpose: Through the establishment of a computerized system of risk assessment, the purpose is to analyze the case of whether the co-workers who are subject to the risk assessment at the construction site can easily fill it out and expect disaster reduction through efficient risk assessment activities. Method: By providing the risk factors and safety measures for the work by selecting the type of work, the risk estimation and the establishment of countermeasures can be made, and a system has been established to enable practical disaster prevention activities by presenting disaster cases for the work. Result: Through the analysis of the change in the scaled disaster rate for the years following the on-site application after the establishment of the risk assessment computer system of H Construction Company, it was confirmed that the scaled disaster rate of the domestic construction industry increased, while the conversion disaster rate of H Construction Company decreased. Conclusion: Through the computational systemization of risk assessments, workers in the field can easily access the risk assessment, evaluate the risk factors of the process and establish risk prevention measures, and it has been analyzed that there is an impact on the reduction of the disaster rate during the operational analysis period.