• Title/Summary/Keyword: 개인용 하드웨어

Search Result 63, Processing Time 0.034 seconds

Classification of DJI Drones Based on Flight Log Decryption Method (비행 로그 복호화 방식에 따른 DJI 드론 분류)

  • Lee, Youngwoo;Kim, Juhwan;Yu, Jihyeon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.77-88
    • /
    • 2022
  • With the development and popularization of drone manufacturing technology, the drone market, which was mainly focused on industry, agriculture, and military, is also showing great growth in individual and commercial markets. Among them, DJI has a high share in the personal and commercial drone market, and accordingly, forensic analysis of DJI drones is drawing attention. In particular, when stealing and analyzing drones used in criminal acts, a technology to interpret flight logs recording drone flight paths and hardware information is needed, which inevitably applies drone models due to differences in decryption methods. Therefore, when an unidentified drone is acquired from the perspective of a digital forensic investigator, a clear classification of a drone model to which analysis can be applied is required. This paper proposes a method of extracting and analyzing artifacts of DJI drones through forensics, and analyzes media data analysis and flight log analysis results and decryption methods for three drone models with different release years of DJI. Finally, drones in the DJI product line are classified according to whether the commercialized DJI drone flight log is decrypted.

Development of IoT Searching System Missing Children by utilizing Open Source Hardware (오픈소스 하드웨어를 이용한 IoT 미아찾기 시스템)

  • Heo, Seong-Mu;Kim, Cha-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.277-280
    • /
    • 2016
  • Currently, systems for finding missing children are composed of using communication between a QR code and RFID chip, as the use of a smartphone. However, the current systems for finding missing children have limitations in that children can only be found if there are people in the surrounding area; there is an economic burden on parents required to purchase a smartphone for their children; along with difficulties in finding the missing children without the assistance of those in the surrounding area in critical situations such as a kidnapping, due to the limited duration of the battery life. In order to solve such problems, approaches need to be made from two perspectives: having someone in the surrounding area; and absence of anyone in the surrounding area. This thesis is centered on the development of a IoT (Internet of Things) system for finding missing children that combines two methods, namely, the method of finding missing children without a guardian in the surrounding area -within the limited space in which AP is installed by using a beacon and open source hardware being highlighted as the IoT technology - and the method of finding missing children with the smartphone application in which each individual becomes the Access Point (AP). The Main purpose is to provide accurate information of missing children's location for the 2situations and it is found that the accuracy of smartphones APP is 97.7% and security device AP is 91.1%.

  • PDF

Research of Customized Electric Wheelchair Control System using NFC on Mobile Device Environment (모바일 디바이스 환경 기반의 NFC를 이용한 사용자 맞춤형 전동 휠체어 제어 시스템 연구)

  • Park, Sanghyun;Kim, Jinsul
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.17-25
    • /
    • 2015
  • In this paper proposes an idea for using NFC(Near Field Communication) on smalt mobile devices, you can easily control the electric wheelchair system. In this system with previous researches controlled a power wheelchair in a mobile device using Bluetooth communication, the board communicates with the integrated control of the wheelchair. With smart mobile devices, the wheelchair control board integrating the signal generated by checking real time so that the user can easily monitor the state of the wheelchair. Users are using smalt mobile devices, the wheelchair can be controlled easily, and the setting at any time according to the state of the individual and can be used. HEX format control is directly in hardware, allowing analysis was read, the user settings are typically used to match cards which support NFC technology such as bus card for registration, storing the selected information and enable read and were applicable. By applying this system, wheelchairs oriented aids disabled and older people able to access to provide with stability.

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

The Development and Implementation of Ward Monitoring Service Using Bluetooth Low Energy Scanners for Infectious Disease Response (감염병 대응 비콘 스캐너 기반의 병실 모니터링 서비스 개발)

  • Lee, Kyu-Man;Park, Ju-young
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.287-294
    • /
    • 2017
  • This study attempted to develop a beacon scanner based ward monitoring service in order to respond to the new paradigm of medical environment which is trying to introduce ICT technology as medical service to track and manage the spread path of large infectious diseases such as MERS. The study also included beacon hardware development, firmware development for the beacon low-power bluetooth 4.0, and server and web-based dashboard UI development. Using these, we have developed a customized monitoring system that provides functions such as locating patients by location based service and monitoring based on web UI. It is possible to maximize the efficiency of offline hospital services and to value active infection control and patient safety by integrating online technology into the area where online technologies such as beacons are not properly integrated.

Development and Case Review of IT Convergence GoGo Bumper Car Project (IT융합 기반의 고고범퍼카 콘텐츠 개발 및 프로젝트 적용 사례)

  • Park, Hong-Joon;Jun, Young-Cook
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.2
    • /
    • pp.21-33
    • /
    • 2015
  • This paper aims at developing IT convergence robot education contents using open hardware-based GoGo Board and presenting three cases that were applied into educational settings with elementary and middle school students. Several types of data for their activities were collected: photos, work output, survey data, video data and interview with robot teacher and students. Each student experienced building up a GoGo Bumper Car with touch sensors attached at front and back sides and figuring out the principle of digital board control and operating of electronic devices by sensing. The participants, in the following phases, conducted domino chain-reaction with GoGo Bumper Cars and acquiring GoGo Driving Licence by driving test on three different road maps. Students in a gifted education program creatively implemented their own ideas as part of robotic art. The result of case analysis showed that the proposed project provides students not only intimacy for technology, fun, concentration but her own empowerment for developing ideas and creative implementation.

Implementation of a High Performance SEED Processor for Smart Card Applications (스마트카드용 고성능 SEED 프로세서의 구현)

  • 최홍묵;최명렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.37-47
    • /
    • 2004
  • The security of personal informations has been an important issue since the field of smart card applications has been expanded explosively. The security of smart card is based on cryptographic algorithms, which are highly required to be implemented into hardware for higher speed and stronger security. In this paper, a SEED cryptographic processor is designed by employing one round key generation block which generates 16 round keys without key registers and one round function block which is used iteratively. Both the round key generation block and the F function are using only one G function block with one 5${\times}$l MUX sequentially instead of 5 G function blocks. The proposed SEED processor has been implemented such that each round operation is divided into seven sub-rounds and each sub-round is executed per clock. Functional simulation of the proposed cryptographic processor has been executed using the test vectors which are offered by Korea Information Security Agency. In addition, we have evaluated the proposed SEED processor by executing VHDL synthesis and FPGA board test. The die area of the proposed SEED processor decreases up to approximately 40% compared with the conventional processor.

A Customized Cancer Radiation Treatment Planning Simulation (ccRTPs) System via Web and Network (웹과 네트워크 기술을 이용한 환자 맞춤식 암치료 계획 시뮬레이션 시스템)

  • Khm, O-Yeon
    • Progress in Medical Physics
    • /
    • v.17 no.3
    • /
    • pp.144-152
    • /
    • 2006
  • The telemedicine using independent client-server system via networks can provide high quality normalized services to many hospitals, specifically to local/rural area hospitals. This will eventually lead to a decreased medical cost because the centralized institute can handle big computer hardware systems and complicated software systems efficiently and economically, Customized cancer radiation treatment planning for each patient Is very useful for both a patient and a doctor because it makes possible for the most effective treatment with the least possible dose to patient. Radiation planners know that too small a dose to the tumor can result in recurrence of the cancer, while too large a dose to healthy tissue can cause complications or even death. The best solution is to build an accurate planning simulation system to provide better treatment strategies based on each patient's computerized tomography (CT) image. We are developing a web-based and a network-based customized cancer radiation therapy simulation system consisting of four Important computer codes; a CT managing code for preparing the patients target data from their CT image files, a parallel Monte Carlo high-energy beam code (PMCEPT code) for calculating doses against the target generated from the patient CT image, a parallel linear programming code for optimizing the treatment plan, and scientific data visualization code for efficient pre/post evaluation of the results. The whole softwares will run on a high performance Beowulf PC cluster of about 100-200 CPUs. Efficient management of the hardware and software systems is not an easy task for a hospital. Therefore, we integrated our system into the client-sewer system via network or web and provide high quality normalized services to many hospitals. Seamless communication with doctors is maintained via messenger function of the server-client system.

  • PDF

A Camera Tracking System for Post Production of TV Contents (방송 콘텐츠의 후반 제작을 위한 카메라 추적 시스템)

  • Oh, Ju-Hyun;Nam, Seung-Jin;Jeon, Seong-Gyu;Sohn, Kwang-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.692-702
    • /
    • 2009
  • Real-time virtual studios which could run only on expensive workstations are now available for personal computers thanks to the recent development of graphics hardware. Nevertheless, graphics are rendered off-line in the post production stage in film or TV drama productions, because the graphics' quality is still restricted by the real-time hardware. Software-based camera tracking methods taking only the source video into account take much computation time, and often shows unstable results. To overcome this restriction, we propose a system that stores camera motion data from sensors at shooting time as common virtual studios and uses them in the post production stage, named as POVIS(post virtual imaging system). For seamless registration of graphics onto the camera video, precise zoom lens calibration must precede the post production. A practical method using only two planar patterns is used in this work. We present a method to reduce the camera sensor's error due to the mechanical mismatch, using the Kalman filter. POVIS was successfully used to track the camera in a documentary production and saved much of the processing time, while conventional methods failed due to lack of features to track.