• Title/Summary/Keyword: embedded computing

Search Result 537, Processing Time 0.026 seconds

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

Development of an intelligent and integrated system for automatic inspection of steam-generator tubes in nuclear power plant (원전 증기 발생기 전열관 검사 자동화를 위한 지능형 통합 시스템 개발)

  • Kang, Soon-Ju;Choi, Yoo-Rark;Choe, Seong-Su;Woo, Hee-Gon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.3
    • /
    • pp.236-241
    • /
    • 1996
  • This paper presents a new eddy current testing system for inspecting tubes of steam generator in nuclear power plant. The proposed system adopted embedded expert system concept to automate tasks of the inspection such as inspection planning and flaw signal interpretation, and integrated all the tasks into a client/server type computing architecture using database management system. Therefore, human factor errors occurred during inspection could be minimized and the inspection data could be transferred in real-time. As a result, we can increase the level of inspection confidence and the productivity of a personal inspector. A prototype of the proposed system has been developed for 5 years and the test operation has been performed in domestic nuclear power plants.

  • PDF

Infrastructure-independent Navigation System Using Embedded Map and Built-in Sensors in the Ubiquitous Parking Management (유비쿼터스 주차관리 시스템에서 내장 맵 및 센서를 이용한 인프라 독립 네비게이션 시스템)

  • Elijorde, Frank I.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.93-104
    • /
    • 2012
  • Significant advancements in technology enhanced the reliability of navigation systems that are in use today. The GPS is the most widely used technique for satellite-based location estimation. However, systems based on GPS can only be accurate in providing location data when there is a clear view of the satellites. This paper proposes a self-contained navigation system that does not depend on any tracking infrastructure. Using the built-in sensors of a smartphone and a self-contained map, we implemented an accurate car locator. Evaluation results show that our proposed system outperforms GPS in providing accurate car location assistance.

Context Awareness of Human Motion States Using a Accelerometer Sensor (가속도계를 이용한 인체동작상태 상황인식)

  • Jin Gye-Hwan;Lee Sang-Bock;Lee Tae-Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.264-268
    • /
    • 2005
  • This paper describes user context awareness system, which is one of the most essential technologies in various application services of ubiquitous computing. The proposed system used two-axial accelerometer, embedded in $SenseWear^{(R)}$ PRO2 Armband (BodyMedia). It was worn on the right upper arm of the experiment subjects. Using this data, PC-based fuzzy inference system was realized to distinguish human motion states, such as, tying, sitting, walking and running. The recognition rates of human motion states were 100 %, 98.64 %, 99.27 % and 100 % respectively for tying, sitting, walking and running.

  • PDF

A neuron computer model embedded Lukasiewicz' implication

  • Kobata, Kenji;Zhu, Hanxi;Aoyama, Tomoo;Yoshihara, Ikuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.449-449
    • /
    • 2000
  • Many researchers have studied architectures for non-Neumann's computers because of escaping its bottleneck. To avoid the bottleneck, a neuron-based computer has been developed. The computer has only neurons and their connections, which are constructed of the learning. But still it has information processing facilities, and at the same time, it is like as a simplified brain to make inference; it is called "neuron-computer". No instructions are considered in any neural network usually; however, to complete complex processing on restricted computing resources, the processing must be reduced to primitive actions. Therefore, we introduce the instructions to the neuron-computer, in which the most important function is implications. There is an implication represented by binary-operators, but general implications for multi-value or fuzzy logics can't be done. Therefore, we need to use Lukasiewicz' operator at least. We investigated a neuron-computer having instructions for general implications. If we use the computer, the effective inferences base on multi-value logic is executed rapidly in a small logical unit.

  • PDF

Optimization of 3D Triangular Mesh Watermarking Using ACO-Weber's Law

  • Narendra, Modigari;Valarmathi, M.L.;Anbarasi, L.Jani
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4042-4059
    • /
    • 2020
  • The development of new multimedia techniques such as 3D printing is increasingly attracting the public's attention towards 3D objects. An optimized robust and imperceptible watermarking method based on Ant Colony Optimization (ACO) and Weber Law is proposed for 3D polygonal models. The proposed approach partitions the host model into smaller sub meshes and generates a secret watermark from the sub meshes using Weber Law. ACO based optimized strength factor is identified for embedding the watermark. The secret watermark is embedded and extracted on the wavelet domain. The proposed scheme is robust against geometric and photometric attacks that overcomes the synchronization problem and authenticates the secret watermark from the distorted models. The primary characteristic of the proposed system is the flexibility achieved in data embedding capacity due to the optimized strength factor. Extensive simulation results shows enhanced performance of the recommended framework and robustness towards the most common attacks like geometric transformations, noise, cropping, mesh smoothening, and the combination of such attacks.

Stroke based Multilingual Input System for Embedded System (임베디드 시스템에서 필획기반 다국어 입력 시스템)

  • Lee, Jin-Yeong;Hong, Sung-Ryrong;Lee, Si-Jin
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.145-153
    • /
    • 2007
  • Recently, development in information technology is mainly focused on mobile service, and most of mobile users are using various services based on wireless network. So the importance of system software or middleware, which enables such mobile services, is growing bigger and bigger, and one of those is character input/output system. This paper will introduce an alphabet input system, which decomposes a character to a series of strokes, by its formation principal. It is designed to make a person, who knows the character, to input characters in the way that he/she is actually writing down the character.

  • PDF

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

A Study on the Development of HWIL Simulation Control System for High Maneuver Guided Missile System (고기동 유도무기를 위한 HWIL 시뮬레이션 제어 시스템 개발 연구)

  • Kim, Woon-Sik;Lee, Byung-Sun;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1659-1666
    • /
    • 2010
  • The High maneuver missiles use various interfaces and high speed guidance and control loop. Hardware-in-the-Loop(HWIL) simulation control system, therefore, should have high performance computing power and hardware interface capabilities, and should be developed using IT technology with which real time operating system, embedded system, data communication technology, and real time hardware control are integrated. This paper suggests the control system design techniques, such as a system hardware configuration, a job distribution algorithm for high performance multi-processors, a real time calculation and control mechanism, inter-processor communication mechanism, and a real time data acquisition technique, to perform the HWIL simulation for high maneuver missile system.