• Title/Summary/Keyword: 전자성능지원시스템

Search Result 256, Processing Time 0.025 seconds

Streaming Device and App Development to Transmit and Play without store for Multimedia Contents (멀티미디어 콘텐츠를 저장 없이 스트리밍 전송 및 재생 가능한 스트리밍 기기 및 스마트 앱 개발)

  • Kang, Young-Man;Cho, Hyug-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.287-294
    • /
    • 2017
  • Recently, many kinds of TV contents based on multimedia need transmission systems without the saved. In this study, we develop the streaming device and smart app to transmit and play without store for multimedia contents such a broadcasting, internet, VOD, video, and animation. To do this, we compare and analysis main CPU products, broadcasting tuners and interfaces for streaming sources, and memory products. We then design and implement the streaming device which supports 30fps@FHD H.264 decoding and streaming, and multimedia sources with more than three. We develop the software for these requirements. Thissystemis useful to support billing service for multimedia contents.

The Information Retrieval System for Software Reuse (소프트웨어 재사용을 위한 정보검색시스템 구축)

  • Kim, Young-Geil
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • In this paper, several problems functioning as the obstacles against software reuse were summarized. Among them, the issues dealt with in this paper include the effective method for constructing the library, the proper structure of the library, and the efficient retrieval technique. The knowledge-based approach and the information retrieval approach were integrated to construct and manage the library. The former is on the object- oriented model. Basically the object-oriented library is based on the classes and organized by inheritance. Because inheritance hierarchy is based on syntactical information, it dose not present the relationship of functionality. Using the information retrieval approach, the index file which characterizes the component and similarity among the components can be analyzed. Especially, we focused on the reusable library for the object-oriented programming environments.

Development of Greenhouse Environment Monitoring & Control System Based on Web and Smart Phone (웹과 스마트폰 기반의 온실 환경 제어 시스템 개발)

  • Kim, D.E.;Lee, W.Y.;Kang, D.H.;Kang, I.C.;Hong, S.J.;Woo, Y.H.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.18 no.1
    • /
    • pp.101-112
    • /
    • 2016
  • Monitoring and control of the greenhouse environment play a decisive role in greenhouse crop production processes. The network system for greenhouse control was developed by using recent technologies of networking and wireless communications. In this paper, a remote monitoring and control system for greenhouse using a smartphone and a computer with internet has been developed. The system provides real-time remote greenhouse integrated management service which collects greenhouse environment information and controls greenhouse facilities based on sensors and equipments network. Graphical user interface for an integrated management system was designed with bases on the HMI and the experimental results showed that a sensor data and device status were collected by integrated management in real-time. Because the sensor data and device status can be displayed on a web page, transmitted using the server program to remote computer and mobile smartphone at the same time. The monitored-data can be downloaded, analyzed and saved from server program in real-time via mobile phone or internet at a remote place. Performance test results of the greenhouse control system has confirmed that all work successfully in accordance with the operating conditions. And data collections and display conditions, event actions, crops and equipments monitoring showed reliable results.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.

Class Gated Dynamic Bandwidth Allocation Algorithm for supporting QoS in the EPON (EPON 시스템에서 효율적인 QoS 제공을 위한 Class Gated 동적 대역 할당 알고리즘)

  • Hwang Jun-Ho;Kim Hyo-Won;Yoo Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.94-103
    • /
    • 2006
  • Ethernet passive optical network (EPON) has drawn many attention as a promising access network technology for FTTH because it can provide a high bandwidth with a low cost. Since the uplink bandwidth in the EPON system is shared by many users, it is necessary for an EPON system to have an efficient bandwidth allocation mechanism. To support QoS in EPON, the previous bandwidth allocation schemes employ strict priority queueing (SPQ). Since SPQ gives unlimited priority to higher service class, the QoS of lower service classes gets worse. In this paper, we propose Class Gated DBA (Dynamic Bandwidth Allocation) algorithm in which the bandwidth is requested / granted in a service class basis. To avoid the monopoly in bandwidth usage by higher classes the maximum bandwidth that is allocate to each service class is limited (fairness between services classes). In addition, to avoid the monopoly in bandwidth usage by some particular users, each ONU runs fairness bandwidth allocation algorithm within each service classes. Through computer simulations, it is verified that the proposed algorithm achieves a good level of QoS, and at the same time maintains a good level of fairness between both service classes and users.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

Erase Group Flash Translation Layer for Multi Block Erase of Fusion Flash Memory (퓨전 플래시 메모리의 다중 블록 삭제를 위한 Erase Croup Flash Translation Layer)

  • Lee, Dong-Hwan;Cho, Won-Hee;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.21-30
    • /
    • 2009
  • Fusion flash memory such as OneNAND$^{TM}$ is popular as a ubiquitous storage device for embedded systems because it has advantages of NAND and NOR flash memory that it can support large capacity, fast read/write performance and XIP(eXecute-In-Place). Besides, OneNAND$^{TM}$ provides not only advantages of hybrid structure but also multi-block erase function that improves slow erase performance by erasing the multiple blocks simultaneously. But traditional NAND Flash Translation Layer may not fully support it because the garbage collection of traditional FTL only considers a few block as victim block and erases them. In this paper, we propose an Erase Group Flash Translation Layer for improving multi-block erase function. EGFTL uses a superblock scheme for enhancing garbage collection performance and invalid block management to erase multiple blocks simultaneously. Also, it uses clustered hash table to improve the address translation performance of the superblock scheme. The experimental results show that the garbage collection performance of EGFTL is 30% higher than those of traditional FTLs, and the address translation performance of EGFTL is 5% higher than that of Superblock scheme.

A Sequential Estimation Algorithm for TDOA/FDOA Extraction for VHF Communication Signals (VHF 대역 통신 신호에서 TDOA/FDOA 정보 추출을 위한 순차 추정 알고리즘)

  • Kim, Dong-Gyu;Kim, Yong-Hee;Park, Jin-Oh;Lee, Moon Seok;Park, Young-Mi;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.60-68
    • /
    • 2014
  • In modern electronic warfare systems, a demand on the more accurate estimation method based on TDOA and FDOA has been increased. TDOA/FDOA localization consists of two-stage procedures; the extraction of information from signals, and the estimation of emitter location. CAF(complex ambiguity function) is known as a basic method in the extraction stage. However, when we extract TDOA and FDOA information from VHF(very high frequency) communication signals, conventional CAF algorithms may not work within a permitted time because of much computation. Therefore, in this paper, an improved sequential estimation algorithm based on CAF is proposed for effective calculation of extracting TDOA and FDOA estimates in terms of computational complexity. The proposed method is compared with the conventional CAF-based algorithms through simulation. In addition, we derive the optimal performance based on the CRLB(Cramer-Lao lower bound) to check the extraction performance of the proposed method.

Infrared-based User Location Tracking System for Indoor Environments (적외선 기반 실내 사용자 위치 추적 시스템)

  • Jung, Seok-Min;Jung, Woo-Jin;Woo, Woon-Tack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.9-20
    • /
    • 2005
  • In this paper, we propose ubiTrack, a system which tracks users' location in indoor environments by employing infrared-based proximity method. Most of recently developed systems have focussed on performance and accuracy. For this reason, they adopted the idea of centralized management, which gathers all information in a main system to monitor users' location. However, these systems raise privacy concerns in ubiquitous computing environments where tons of sensors are seamlessly embedded into environments. In addition, centralized systems also need high computational power to support multiple users. The proposed ubiTrack is designed as a passive mobile architecture to relax privacy problems. Moreover, ubiTrack utilizes appropriate area as a unit to efficiently track users. To achieve this, ubiTrack overlaps each sensing area by utilizing the TDM (Time-Division Multiplexing) method. Additionally, ubiTrack exploits various filtering methods at each receiver and utilization module. The filtering methods minimize unexpected noise effect caused by external shock or intensity weakness of ID signal at the boundary of sensing area. ubiTrack can be applied not only to location-based applications but also to context-aware applications because of its associated module. This module is a part of middleware to support communication between heterogeneous applications or sensors in ubiquitous computing environments.

A Design and Implementation of NFC Bridge Chip (NFC 브릿지 칩 설계 및 구현)

  • Lee, Pyeong-Han;Ryu, Chang-Ho;Chun, Sung-Hun;Kim, Sung-Wan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.96-101
    • /
    • 2015
  • This paper describes a design and implementation of the NFC bridge chip which performs interface between kinds of devices and mobile phones including NFC controller through NFC communication. The NFC bridge chip consists of the digital part and the analog part which are based on NFC Forum standard. Therefore the chip treats RF signals and then transforms the signal to digital data, so it can interface kinds of devices with the digital data. Especially the chip is able to detect RF signals and then wake up the host processor of a device. The wakeup function dramatically decreases the power consumption of the device. The carrier frequency is 13.56MHz, and the data rate is up to 424kbps. The chip has been fabricated with SMIC 180nm mixed-mode technology. Additionally an NFC bridge chip application to the blood glucose measurement system is described for an application example.