• Title/Summary/Keyword: raspberry Pi

Search Result 396, Processing Time 0.03 seconds

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.

Development Plan of a Human Model System for Educating Acupoint Location and Its Implementation (경혈 위치교육 평가지원시스템의 개발계획 수립과 제작)

  • Yeo, Sujung;Nam, Donghyun
    • Korean Journal of Acupuncture
    • /
    • v.36 no.1
    • /
    • pp.44-51
    • /
    • 2019
  • Objectives : Teaching the standardized acupuncture point locations and improving the accuracy of acupoint locations through objective evaluation is a very important part of Korean medicine education. The aim of this study is to develop a dummy system for evaluation and support of teaching acupoint location in meridian and acupoints classes and to introduce the developed system. Methods : We established a protocol for the development of the system. The protocol included definition of usage purpose, definition of its essential performance, and set of scope. The system compares the amount of light at the target acupoint with the amount of light at the other sites to determine whether the target acupoint is properly specificated. Results : A prototype of the system was built according to the protocol and consists of light emitter, dummy, control/operation, input part and output part. The light emitter projects laser beam passing through the skin of the dummy. Light sensors were attached inside the acupoints of the dummy. Three types of light sensors were selected depending on the location of the acupoints. The arithmetic, input, and output parts were constructed using Arduino and Raspberry pi boards. The developed system was applied in class. Conclusions : It is thought that the dummy system for evaluation and support of teaching acupoint location can be used as a training model in order to help teach standardized acupoint locations and objective evaluation.

Design and Implementation of a WiFi Trashcan based on Arduino (아두이노 기반 WiT(WiFi Trashcan)의 설계 및 구현)

  • Yoo, Jong-Yeol;Kim, Hyun-Il;Lee, Jang-Ho;Yang, Dong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.270-273
    • /
    • 2016
  • Recently due to development of IT technology, ideas and technology that blends with environment has evolved. In this paper, we propose WiT(WiFI Trash-Can) which takes advantage of the IT technology fusion and environmental factors at the same time to create a more pleasant environment. WiT provides a free WiFi when disposing trash in the trash can. WiT which is synthetic name for WiFi and Trash-Can is a system that is provides free WiFi when people dispose litter to detect whether user had access and determined the volume of the trash disposed. WiT uses Arduino and Raspberry Pi to detect the amount of trash and provide WiFi output on the display to show the ability to design and implement the remaining amount of time available.

  • PDF

A Study on the Practical Methodology of Engineering Education through the Making of Smart Mirror (스마트 거울의 제작을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Seo, Myeong-Deok;Kwon, Ji-Young;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.9-15
    • /
    • 2018
  • A digital signage is constructed using a speech recognition based API, and VRSM (Voice Recognition Smart Mirror) that obtains information such as weather, map, exercise information, schedule, and image by user's voice command so as to be different from other commercialized products is proposed. This course provides an effective method of engineering education through the process of being evaluated as the result of independent graduation certification system, and also it had been the opportunity to design and produce works for 3 semesters by 2 students one group in the majors. Through the comprehensive capstone design, it has experienced engineering approach and creative thinking opportunity. We have won the best academic prize by participating in the academic conferences of the institute about the interim result, and obtained the results of the prize contest in other academic conferences. The improvement in practical skills obtained through this process proved to be beneficial for self-confidence and job-seeking opportunities through actual employment.

Implementation of Speech Recognition and Flight Controller Based on Deep Learning for Control to Primary Control Surface of Aircraft

  • Hur, Hwa-La;Kim, Tae-Sun;Park, Myeong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose a device that can control the primary control surface of an aircraft by recognizing speech commands. The speech command consists of 19 commands, and a learning model is constructed based on a total of 2,500 datasets. The training model is composed of a CNN model using the Sequential library of the TensorFlow-based Keras model, and the speech file used for training uses the MFCC algorithm to extract features. The learning model consists of two convolution layers for feature recognition and Fully Connected Layer for classification consists of two dense layers. The accuracy of the validation dataset was 98.4%, and the performance evaluation of the test dataset showed an accuracy of 97.6%. In addition, it was confirmed that the operation was performed normally by designing and implementing a Raspberry Pi-based control device. In the future, it can be used as a virtual training environment in the field of voice recognition automatic flight and aviation maintenance.

Implementation of Machine Learning-Based Art Work Recommendation Service in Embedded System Environments (임베디드 시스템 환경에서의 머신러닝 기반 미술 작품 추천 서비스 구현)

  • Cheon, Mi-Hyeon;Lee, Donghwa
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.265-271
    • /
    • 2019
  • The number of galleries across the country is increasing as interest in cultural life increases due to the increase in national income. However, museum satisfaction is relatively low compared to other services. In this paper, we propose a service that provides preference information based on machine learning in embedded system environment in order to increase museum satisfaction. The proposed algorithm implements an embedded system using Raspberry Pi. Machine learning was used to find works similar to the viewer's favorite works, and several models were compared to select models applicable to embedded systems. By using the preference information, it is possible to effectively organize the gallery exhibition contents to increase the exhibition satisfaction and the re-visit rate of the museum.

Remote Control System using Face and Gesture Recognition based on Deep Learning (딥러닝 기반의 얼굴과 제스처 인식을 활용한 원격 제어)

  • Hwang, Kitae;Lee, Jae-Moon;Jung, Inhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.115-121
    • /
    • 2020
  • With the spread of IoT technology, various IoT applications using facial recognition are emerging. This paper describes the design and implementation of a remote control system using deep learning-based face recognition and hand gesture recognition. In general, an application system using face recognition consists of a part that takes an image in real time from a camera, a part that recognizes a face from the image, and a part that utilizes the recognized result. Raspberry PI, a single board computer that can be mounted anywhere, has been used to shoot images in real time, and face recognition software has been developed using tensorflow's FaceNet model for server computers and hand gesture recognition software using OpenCV. We classified users into three groups: Known users, Danger users, and Unknown users, and designed and implemented an application that opens automatic door locks only for Known users who have passed both face recognition and hand gestures.

Early Alert System of Vespa Attack to Honeybee Hive: Prototype Design and Testing in the Laboratory Condition (장수말벌 공격 조기 경보 시스템 프로토타입 설계 및 실내 시연)

  • Kim, Byungsoon;Jeong, Seongmin;Kim, Goeun;Jung, Chuleui
    • Journal of Apiculture
    • /
    • v.32 no.3
    • /
    • pp.191-198
    • /
    • 2017
  • Vespa hornets are notorious predators of honeybees in Korean beekeeping. Detection of vespa hornet attacking on honeybee colony was tried through analysis of wing beat frequency profiling from Vespa mandarinia. Wing beat profiles of V. mandarinia during active flight and resting were distinctively different. From the wing beat profiling, algorithm of automated detection of vespa attack was encoded, and alert system was developed using Teensy 3.2 and Raspberry pi 3. From the laboratory testing, the prototype system successfully detected vespa wing beats and delivered the vespa attack information to the user wirelessly. Further development of the system could help precision alert system of the vespa attack to apiary.

Artificial Intelligence-Based Harmful Birds Detection Control System (인공지능 기반 유해조류 탐지 관제 시스템)

  • Sim, Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.175-182
    • /
    • 2021
  • The purpose of this paper is to develop a machine learning-based marine drone to prevent the farming from harmful birds such as ducks. Existing drones have been developed as marine drones to solve the problem of being lost if they collide with birds in the air or are in the sea. We designed a CNN-based learning algorithm to judge harmful birds that appear on the sea by maritime drones operating by autonomous driving. It is designed to transmit video to the control PC by connecting the Raspberry Pi to the camera for location recognition and tracking of harmful birds. After creating a map linked with the location GPS coordinates in advance at the mobile-based control center, the GPS location value for the location of the harmful bird is received and provided, so that a marine drone is dispatched to combat the harmful bird. A bird fighting drone system was designed and implemented.

Considerations for Applying SDN to Embedded Device Security (임베디드 디바이스 보안을 위한 SDN 적용 시 고려사항)

  • Koo, GeumSeo;Sim, Gabsig
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.51-61
    • /
    • 2021
  • In the era of the 4th industrial revolution symbolized by the Internet of Things, big data and artificial intelligence, various embedded devices are increasing exponentially. These devices have communication functions despite their low specifications, so the possibility of personal information leakage is increasing, and security threats are also increasing. Embedded devices can have security issues at most levels, from hardware to services over the network. In addition, it is difficult to apply general security techniques because it has characteristics of resource constraints such as low specifications and low power, and the related technology has not been standardized. In this study, we present vulnerabilities and possible problems and considerations in applying SDN to embedded devices in consideration of structural characteristics and real-world discovered cases. This study presents vulnerabilities and possible problems and considerations when applying SDN to embedded devices. From a hardware perspective, we consider the problems of Wi-Fi chips and Bluetooth, the problems of open flow implementation, SDN controllers, and examples of structural properties. SDN separates the data plane and the control plane, and provides a standardized interface between the two, enabling efficient communication control. It can respond to the security limitations of existing network technologies that are difficult to respond to rapid changes.