• Title/Summary/Keyword: lightweight network

Search Result 285, Processing Time 0.037 seconds

Low-Power Streamable AI Software Runtime Execution based on Collaborative Edge-Cloud Image Processing in Metaverse Applications (에지 클라우드 협동 이미지 처리기반 메타버스에서 스트리밍 가능한 저전력 AI 소프트웨어의 런타임 실행)

  • Kang, Myeongjin;Kim, Ho;Park, Jungwon;Yang, Seongbeom;Yun, Junseo;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1577-1585
    • /
    • 2022
  • As the interest in the 4th industrial revolution and metaverse increases, metaverse with multi edge structure is proposed and noted. Metaverse is a structure that can create digital doctor-like system through a large amount of image processing and data transmission in a multi edge system. Since metaverse application requires calculating performance, which can reconstruct 3-D space, edge hardware's insufficient calculating performance has been a problem. To provide streamable AI software in runtime, image processing, and data transmission, which is edge's loads, needs to be lightweight. Also lightweight at the edge leads to power consumption reduction of the entire metaverse application system. In this paper, we propose collaborative edge-cloud image processing with remote image processing method and Region of Interest (ROI) to overcome edge's power performance and build streamable and runtime executable AI software. The proposed structure was implemented using a PC and an embedded board, and the reduction of time, power, and network communications were verified.

Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric (하이퍼레저 패브릭을 이용한 화물차 디지털 운행기록 단말기의 안전운행 보상시스템 구현)

  • Kim, Yong-bae;Back, Juyong;Kim, Jongweon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.47-56
    • /
    • 2022
  • The safe driving reward system aims to reduce the loss of life and property by reducing the occurrence of accidents by motivating safe driving and encouraging active participation by providing direct reward to vehicle drivers who have performed safe driving. In the case of the existing digital tachograph, the goal is to limit dangerous driving by recording the driving status of the vehicle whereas the safe driving reward system is a support measure to increase the effect of accident prevention and induces safe driving with financial reward when safe driving is performed. In other words, in an area where accidents due to speeding are high, direct reward is provided to motivate safe driving to prevent traffic accidents when safe driving instructions such as speed compliance, maintaining distance between vehicles, and driving in designated lanes are performed. Since these safe operation data and reward histories must be managed transparently and safely, the reward evidences and histories were constructed using the closed blockchain Hyperledger Fabric. However, while transparency and safety are guaranteed in the blockchain system, low data processing speed is a problem. In this study, the sequential block generation speed was as low as 10 TPS(transaction per second), and as a result of applying the acceleration function a high-performance network of 1,000 TPS or more was implemented.

A Study on the Characteristics of the Modern Chair Design (현대 의자 디자인의 특성에 관한 연구)

  • 신홍경
    • Korean Institute of Interior Design Journal
    • /
    • no.13
    • /
    • pp.187-196
    • /
    • 1997
  • A Study on the Characteristics of the Modern Chair Design The features of the modern chair design results from the diverse life style unfolded as per the 20th century social structure and the change of the residential space, and new design has been being developed by the scientists and the artists in various fields through their cooperated work in a way. The field of the scientific or technical study and creation of arts can be developed where they can evoke the sympathy in the circumstances under which the various styles of both arts and science meet across, complement crash together, and grow up. The operation which can control in the network of such pluralistic sphere has been needed for a long period and it has been facing the needs from a time and society. The engineering furniture as the counterplan of the above has brought the value of materials into relief to the forms of human life by making the properties of matter the maximum value or changing it. It can be summarized as following characteristics in its materials and forms along as well as the 3 types (handycrafty, mechanical, and ecological expression) in process through the 20th century. 1. Characteristics in Materials elasticity of the chair as per the changes of the flexibility in the steel pipe development of systematic chair using the plasticity of the plywood, plastic, and wire lightweight due to the materials such as aluminum. 2. Formative characteristics formative simplicity for the increase of the function and the quality improvement such as sociality, productivity, environmental and aesthetic nature emphasis on the structure as per the architectural environment and tecniques pursuit of the forms as a container of the human body seeking for the formative values as the cultural symbols coping with the needs from thepluralistic social structure Furniture is not the makeup for convenience sake but most importantexpression as necessaries of our environments. It should identify itself always as per these kind of needs and also it should be able to used to keep the relation of such mutual division, otherwise the purchase of new furniture should be necessary according to every change of the existing situatiov. Our residence doesn't need the specific style but expresses only the properties of the dwellers.

  • PDF

A Scalable Distributed Worm Detection and Prevention Model using Lightweight Agent (경량화 에이전트를 이용한 확장성 있는 분산 웜 탐지 및 방지 모델)

  • Park, Yeon-Hee;Kim, Jong-Uk;Lee, Seong-Uck;Kim, Chol-Min;Tariq, Usman;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.517-521
    • /
    • 2008
  • A worm is a malware that propagates quickly from host to host without any human intervention. Need of early worm detection has changed research paradigm from signature based worm detection to the behavioral based detection. To increase effectiveness of proposed solution, in this paper we present mechanism of detection and prevention of worm in distributed fashion. Furthermore, to minimize the worm destruction; upon worm detection we propagate the possible attack aleγt to neighboring nodes in secure and organized manner. Considering worm behavior, our proposed mechanism detects worm cycles and infection chains to detect the sudden change in network performance. And our model neither needs to maintain a huge database of signatures nor needs to have too much computing power, that is why it is very light and simple. So, our proposed scheme is suitable for the ubiquitous environment. Simulation results illustrate better detection and prevention which leads to the reduction of infection rate.

Web Service Migration based on Contexts (컨텍스트에 기반한 웹 서비스 이동)

  • Kim, Yeon-Seok;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.1
    • /
    • pp.106-116
    • /
    • 2008
  • It is difficult to provide Web services on a mobile environment because of the intermittent disconnection of a wireless network and the frequent change of context information. To resolve this, Web services must be migrate to devices, which can provide services to users seamlessly. However, researches on hosting, migrating, and replicating Web services on mobile devices are still in an early stage. This paper presents a lightweight Web service framework and an efficient method for establishing a policy of migrating Web services. Based on the WS-Policy standard, the proposed method defines a policy schema, which provides constructs for describing various kinds of contextual information. Specifically, the schema is designed to be extensible enough for different service providers to use different vocabularies to describe their policies. To show the validity, the proposed method for establishing a migration policy has been applied to our mobile Web services framework, resulting in a seamless provisioning of services.

  • PDF

Proposal for License Plate Recognition Using Synthetic Data and Vehicle Type Recognition System (가상 데이터를 활용한 번호판 문자 인식 및 차종 인식 시스템 제안)

  • Lee, Seungju;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.776-788
    • /
    • 2020
  • In this paper, a vehicle type recognition system using deep learning and a license plate recognition system are proposed. In the existing system, the number plate area extraction through image processing and the character recognition method using DNN were used. These systems have the problem of declining recognition rates as the environment changes. Therefore, the proposed system used the one-stage object detection method YOLO v3, focusing on real-time detection and decreasing accuracy due to environmental changes, enabling real-time vehicle type and license plate character recognition with one RGB camera. Training data consists of actual data for vehicle type recognition and license plate area detection, and synthetic data for license plate character recognition. The accuracy of each module was 96.39% for detection of car model, 99.94% for detection of license plates, and 79.06% for recognition of license plates. In addition, accuracy was measured using YOLO v3 tiny, a lightweight network of YOLO v3.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

A Robust Pair-wise Key Agreement Scheme based on Multi-hop Clustering Sensor Network Environments (멀티홉 클러스터 센서 네트워크 환경 기반에서 견고한 키 교환)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.251-260
    • /
    • 2011
  • In this paper, we proposed a scheme that it safely exchanges encrypted keys without Trust Third Party (TTP) and Pre-distributing keys in multi-hop clustering sensor networks. Existing research assume that it exists a TTP or already it was pre-distributed a encrypted key between nodes. However, existing methods are not sufficient for USN environment without infrastructure. Some existing studies using a random number Diffie-Hellman algorithm to solve the problem. but the method was vulnerable to Replay and Man-in-the-middle attack from the malicious nodes. Therefore, authentication problem between nodes is solved by adding a ��TESLA. In this paper, we propose a modified Diffie-Hellman algorithm that it is safe, lightweight, and robust pair-wise agreement algorithm by adding One Time Password (OTP) with timestamp. Lastly, authentication, confidentiality, integrity, non-impersonation, backward secrecy, and forward secrecy to verify that it is safe.