• Title/Summary/Keyword: t-module

Search Result 889, Processing Time 0.03 seconds

Implementation of the Industrial Hazard Detection System using LoRa Network (LoRa 통신기반 산업재해감지시스템 구현)

  • Seo, Jung-Hoon;Kim, Nak-Hun;Hong, Sung-Yong
    • Journal of Information Technology Services
    • /
    • v.18 no.1
    • /
    • pp.141-151
    • /
    • 2019
  • To protect workers from industrial accidents, IoT hazard detection system using LoRa network was designed and fabricated. LoRa networks can operate with low power consumption, wide coverage, and low usage fees. The hazard detection system consists of a sensor unit, a transceiver module, a LoRa base station, ThingPlug, and a monitoring device. We have designed an optimal risk-determining algorithm that can send information quickly in a working environment. As measured by TTA, the implemented system has been found to be able to deliver the worker's location, ambient temperature, and carbon monoxide density to the administrator through the user interface. The implemented system showed a bit rate of 290bps and a maximum application range of 6 km.

A Data Transmission Mode Change Method for Improving Energy Efficiency in IoT Environments

  • Lee, Sukhoon;Kim, Kwangsu;Jeong, Dongwon
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.1
    • /
    • pp.57-69
    • /
    • 2020
  • In general, many IoT devices, including smart phones, use LTE, Wi-Fi, and Bluetooth, and these communication modules generate a lot of energy consumption during periodic data transmission. This paper proposes a method of the data transmission mode change for improving energy efficiency in various communication environments that mobile devices may encounter. We propose an algorithm for setting the mode considering energy efficiency, data transmission performance and cost when the mobile device transmits data, and transmitting the data in an optimized manner according to the state of the mobile device. The proposed algorithm is implemented through experiments on energy efficiency for each communication module, and the scenario is used to verify how efficiently the proposed algorithm uses energy.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

A TORSION GRAPH DETERMINED BY EQUIVALENCE CLASSES OF TORSION ELEMENTS AND ASSOCIATED PRIME IDEALS

  • Reza Nekooei;Zahra Pourshafiey
    • Bulletin of the Korean Mathematical Society
    • /
    • v.61 no.3
    • /
    • pp.797-811
    • /
    • 2024
  • In this paper, we define the torsion graph determined by equivalence classes of torsion elements and denote it by AE(M). The vertex set of AE(M) is the set of equivalence classes {[x] | x ∈ T(M)*}, where two torsion elements x, y ∈ T(M)* are equivalent if ann(x) = ann(y). Also, two distinct classes [x] and [y] are adjacent in AE(M), provided that ann(x)ann(y)M = 0. We shall prove that for every torsion finitely generated module M over a Dedekind domain R, a vertex of AE(M) has degree two if and only if it is an associated prime of M.

Fuel Consumption Prediction and Life Cycle History Management System Using Historical Data of Agricultural Machinery

  • Jung Seung Lee;Soo Kyung Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.5
    • /
    • pp.27-37
    • /
    • 2022
  • This study intends to link agricultural machine history data with related organizations or collect them through IoT sensors, receive input from agricultural machine users and managers, and analyze them through AI algorithms. Through this, the goal is to track and manage the history data throughout all stages of production, purchase, operation, and disposal of agricultural machinery. First, LSTM (Long Short-Term Memory) is used to estimate oil consumption and recommend maintenance from historical data of agricultural machines such as tractors and combines, and C-LSTM (Convolution Long Short-Term Memory) is used to diagnose and determine failures. Memory) to build a deep learning algorithm. Second, in order to collect historical data of agricultural machinery, IoT sensors including GPS module, gyro sensor, acceleration sensor, and temperature and humidity sensor are attached to agricultural machinery to automatically collect data. Third, event-type data such as agricultural machine production, purchase, and disposal are automatically collected from related organizations to design an interface that can integrate the entire life cycle history data and collect data through this.

Clinical, histologic, and histometric evaluation of implants with microthreaded crest module and SLA surface (SLA로 표면처리한 microthreaded crest module 임프란트의 임상적, 조직학적, 조직계측학적 분석)

  • Moon, Sang-Kwon;Pang, Eun-Kyoung;Kim, Chang-Sung;Cho, Kyoo-Sung;Chai, Jung-Kiu;Kim, Chong-Kwan;Choi, Seong-Ho
    • Journal of Periodontal and Implant Science
    • /
    • v.34 no.1
    • /
    • pp.127-138
    • /
    • 2004
  • Background: Crestal bone loss known as saucerization is a frequently observed phenomenon. Recent studies have shown that implants with micothreaded crest module reduced the force concentration in the crestal region thus resulting in no or reduced crestal bone loss. This study presents a clinical, histologic, and histometric evaluation of implants with microthreaded crest module and SLA surface. Methods: The implants were placed in the mandible of 5 beagle dogs weighing 10-15kg. Four premolars were bilaterally extracted 8 weeks prior to implant placement. Mucoperiosteal flap was elevated and drilling with increasing diameter was performed under saline irrigation. After countersinking 2 implants were placed in each side resulting in 4 implants per dog. Healing period of 8 weeks was allowed before sacrificing the animals. Histologic preparation was performed for histologic and histometric analysis. Bone to implant contact as well as percentage of bone area inside threads were measured. T-test was used for statistical analysis with pvalue p<0.05. Results: 1. Healing was uneventful without any cover screw exposure. New bone formation around the implants was observed without any inflammatory infiltration. 2. Bone to implant contact in the microthread and thread were 43.90 ${\pm}$ 20.30 %, and 53.19 ${\pm}$ 20.97 % respectively. The overall bone to implant contact was 48.54 ${\pm}$ 20.95 %. 3. Percentage of bone area inside threads were 54.43 ${\pm}$ 10.39 %, and 38.44 ${\pm}$ 16.44 % for the microthread and thread respectively. There was statistically significant difference(p<0.05). The overall percentage of bone area inside threads was 46.67 ${\pm}$ 15.68 %.

Implementation of Multi-Protocol Interface for Web-based Collaborative Service (웹 기반 공동작업을 위한 다중 프로토콜 인터페이스 방법의 구현)

  • 이은령;김지용;설동명;김두현;임기욱
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.340-351
    • /
    • 2003
  • We introduce our experiences of the design and implementation of the Page Together system that has expanded hyperlink metaphor to utilize human resources in the web. This system supports that a user connects with others in the web, communicates through video/audio channel, navigates same web pages simultaneously and cooperates some work on Internet. For these functions, it comprises Collaborative Browsing Module (CBM), Multimedia Conferencing Module(MCM) Data Conferencing Module(I)CM) and Multi Protocol Interface(MPI). We adopted three standard protocols, IEC, H.323 and T.120 for each nodule and it allows developers to use them easily. We also defined MPI to synchronize information of session among modules. Each module exchanges information each other in session creating process and session terminating process. After a session is created once, each module works independently as its won protocol. Interferences among modules are reduced as minimizing to exchange information. We also introduce a web site that provides web board service based on the Page Together system. A user may post a notice with a link to himself/herself on our web board. After then, if someone read that notice and has any question about it, he or she can try to connect to the writer as clicking the link in that notice and communicate each other. This service site shows that our system can be applied to diverse internet services such as distance teaming and distance conference.

  • PDF

A USB classification system using deep neural networks (인공신경망을 이용한 USB 인식 시스템)

  • Woo, Sae-Hyeong;Park, Jisu;Eun, Seongbae;Cha, Shin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.535-538
    • /
    • 2022
  • For Plug & Play of IoT devices, we develop a module that recognizes the type of USB, which is a typical wired interface of IoT devices, through image recognition. In order to drive an IoT device, a driver for communication and device hardware is required. The wired interface for connecting to the IoT device is recognized by using the image obtained through the camera of smartphone shooting to recognize the corresponding communication interface. For USB, which is a most popular wired interface, types of USB are classified through artificial neural network-based machine learning. In order to secure sufficient data set of artificial neural networks, USB images are collected through the Internet, and additional image data sets are secured through image processing. In addition to the convolution neural networks, recognizers are implemented with various deep artificial neural networks, and their performance is compared and evaluated.

  • PDF

The Development of A Dynamic Traffic Assignment Technique using the Cell Transmission Theory (Cell Transmission 이론을 이용한 동적통행배정기법 개발에 관한 연구)

  • 김주영;이승재;손의영
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.4
    • /
    • pp.71-84
    • /
    • 1999
  • The purpose of this study is to construct a dynamic traffic analysis model using the existing traffic flow theory in order to develope a dynamic traffic assignment technique. In this study the dynamic traffic analysis model was constructed using Daganzo's CELL TRANSMISSION THEORY which was considered more suitable to dynamic traffic assignment than the other traffic flow theories. We developed newly the diverging split module, the cost update module and the link cost function and defined the maximum waiting time decision function that Daganzo haven't defined certainly at his Papers. The output that resulted from the simulation of the dynamic traffic analysis model with test network I and II was shown at some tables and figures, and the analysis of the bottleneck and the HOV lane theory showed realistic outputs. Especially, the result of traffic assignment using the model doesn't show equilibrium status every time slice but showed that the average travel cost of every path maintains similarly in every time slice. It is considered that this model can be used at the highway operation and the analysis of traffic characteristics at a diverging section and the analysis of the HOV lane effect.

  • PDF

Cryptft+ : Python/Pyqt based File Encryption & Decryption System Using AES and HASH Algorithm (Crypft+ : Python/PyQt 기반 AES와 HASH 알고리즘을 이용한 파일 암복호화 시스템)

  • Shin, Dongho;Bae, Woori;Shin, Hyeonggyu;Nam, Seungjin;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.43-51
    • /
    • 2016
  • In this paper, we have developed Crypft+ as an enhanced file encryption/decryption system to improve the security of IoT system or individual document file management process. The Crypft+ system was developed as a core security module using Python, and designed and implemented a user interface using PyQt. We also implemented encryption and decryption function of important files stored in the computer system using AES based symmetric key encryption algorithm and SHA-512 based hash algorithm. In addition, Cx-Freezes module is used to convert the program as an exe-based executable code. Additionally, the manual for understanding the Cryptft+ SW is included in the internal program so that it can be downloaded directly.