• Title/Summary/Keyword: 펌

Search Result 215, Processing Time 0.029 seconds

The Study on DBPL Encoder Design for Railway Balise Application (철도 발리스 응용을 위한 DBPL 인코더 설계 연구)

  • Lee, Jeong-jun;Yang, Doh-chul;Kim, Seong-jin;Kim, Bong-seob;Kim, Yu-hyeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.2
    • /
    • pp.161-170
    • /
    • 2017
  • The balise is a device for the railroad signal control systems, which is installed between both rail. The balise sends fixed or variable data, named telegram, to the train with wireless method. The telegram includes the position information, the movable distance under the signal status, the gradient, the speed, the temporary speed limit, etc. This research is on a design of the DBPL encoder for the balise. Normally the DBPL encoder for the balise is with the ASIC or FPGA technology. In this research, the DBPL encoder is designed with commercial low power operable micro-controller. The firmware(logic level encode) and the SPI Bus function block(physical level output) of the micro-controller are used for the DBPL encode. Under the european standard, the required working speed of the DBPL encoder is 564.48Kbps. The DBPL encoder of this research is tested under the speed of 564.48Kbps, and it worked properly.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

BlueTooth Snarfing attacks and security aspects (BlueTooth Snarfing 공격 및 보안측면)

  • Park, Hyun Uk;Kim, Hyun Soo;Kim, Ki Hawn;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.811-814
    • /
    • 2015
  • There are many modern societies use the digital products in everyday life in the Middle, convenience, give him plenty of Bluetooth is one of the users. Bluetooth (IEEE 802.15.1) means equipment in the close range between the low-power wireless communication standard for the connection to use the technology. Currently, Bluetooth earphone, Bluetooth speaker, wearable mounted devices also used a lot because it takes people to exploit the benefits had been lifted and thereby increases your damage. So, reducing the damage the user's further research about the security technique that can stop completely. I am sure that many Bluetooth hacking techniques, a Bluetooth device firmware vulnerability within the stored data to allow the approach to attacking the BlueTooth Snarfing and want to analyze.

  • PDF

Development of CW Doppler Sensor Signal Processing Board for Motion Detection (움직임 감지를 위한 CW도플러 센서 신호처리 보드 개발)

  • Han, Byung-hun;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.866-869
    • /
    • 2015
  • In this paper, we propose a device for detect front object using low-price the CW Doppler sensor to prevent safety accident such as a bicycle, an electric wheelchair users. For this propose, we develop a signal process board and the object motion detect algorithm using to analyzing output signal of the CW Doppler sensor. Output signal from CW Doppler sensor is analog I and analog Q. The CW Doppler sensor shows phase I and phase Q of object differently when the object approach, stop, drop by sensor. We develop an algorithm that can detect object by discrimination information of phase using the CW Doppler sensor. The verification use firmware of applied hardware and algorithm. Then, the motion information can be confirming output depending on motion object by experiment normally. As a result, we check that the sensing information output by following motion of object and confirm an algorithm and motion of signal processing board.

  • PDF

Implementation and application of remote control system using LACC(Local Area Control Center) (LACC를 이용한 원격제어 시스템 구현 및 적용)

  • Park Tae-Jin;Jang Myung-Kee;Chung Seung-Ryul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.15-22
    • /
    • 2006
  • Nowadays, there is called energy saving, that it is accomplished with a lot study and application development as according to demand of all around world. It is using to network device of wire or wireless such as internet, lan, plc, and zigbee and that we should be accomplished to study about method that spending a little cost to fatal error in control system that be expected of frequent occurrence on network, and that have method to do construction a little bit tried out. Also, in that such a embedded system with network function case, there is important thing that it is remote management to network node and control methods to trust because firmware upgrade have the advantage of more than the other device. In this paper, we have verified through a result of experiment for efficient remote management and control method as previously stated in this paper, that it is area of the PLC for sensor node and doing management to relay, and implementation of the LACC which is core part of the ESS, and in order to get a result to trust from doing analysis of capacity and test.

Wrist Wearable Device for the Measurement and Analysis of Physiological Signals (생체신호 측정 및 분석을 위한 손목 착용형 단말기)

  • Im, Jae Joong;Li, Ming Kui;Hwang, Chan Song
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.65-73
    • /
    • 2012
  • Wrist wearable device for the measurement of pulse rate, ECG, and activity during normal daily life, which could be used for the continuous monitoring and remote transmission of acquired data, was developed. Pressure sensor, device attached electrodes, and 3-degree accelerometer were used. Analysis algorithm and firmware program were established for providing diagnostic information for the users. Results of this study, possible for the management of health report and transmission of the results through bluetooth by wearing simple personal wrist device, could be used for the development of portable device in the u-healthcare environment.

A Design and Implementation of Educational Mobile Robot System including Remote Control Function (원격 제어 기능을 포함한 교육용 모바일 로봇 시스템의 설계 및 구현)

  • Chung, Joong-Soo;Jung, Kwang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.4
    • /
    • pp.33-40
    • /
    • 2015
  • This paper presents the design and implementation of the educational remote controlled robot system including remote sensing in the embedded environment. The design of sensing information processing, software design and template design mechanism for the programming practice are introduced. LPC1769 using Cortex-M3 core as CPU, LPCXPRESSO as debugging environment, C language as firmware development language and FreeRTOS as OS are used in development environment. The control command is received via RF communication by the server and the robot system which is operated by driving the various sensors. The educational procedure is from robot demo operation program as hands-on practice and then compiling, loading of the basic robot operation program, already supplied. Thereafter the verification is checked by using the basic robot operation to allow demo operation such as hands-on-training procedure. The original protocol is designed via RF communication between server and robot system, and the satisfied performance result is presented by analyzing the robot sensing data processing.

Hair Style Image by Variations of Hair Design Elements (헤어디자인요소의 변화에 따른 헤어스타일이미지)

  • Lee, Hyo-Sook;Park, Sook-Hyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.11
    • /
    • pp.1782-1791
    • /
    • 2008
  • The purpose of this study was to find out the hair style image about variations of hair design elements. The method of this study was quasi-experimentation. The twelve color photographs of manikins with various hair style were used as the stimulus. As measuring instrument, a likert scale composed of 35 items of five point adjectives was used. The sample consisted of 157 males and 140 females residing in the Busan area. The range of the age is from 20 to 55. The survey was conducted from August to September in 2007. The data were analyzed by factor analysis, frequency, crosstabs one-way analysis of variance, Duncan's test and t-test used SPSS Packages. The results of this study were as follows: 1. As a result of factor analysis, 8 factors - romantic, natural, elegant, simple, classic, casual, modem and mannish were found out as constructing factors of hairstyle image. 2. As a result of hair style image analysis about variations of hair-length, The short hair style was perceived in modern, mannish, casual, sophisticate, medurm-length style in classic and elegant, long hair style was perceived to be high in romantic and natural. 3. As a result of hair style image analysis about variations of hair design elements, The length of hair style was the most influential element in hair design and secondly important one was the wave of hair style. The color of hair style didn't critical effect on image of hair style.

A Three Schematic Analysis of Information Visualization (정보시각화에 대한 스킴모형별 비교 분석)

  • Seo, Eun-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.4
    • /
    • pp.175-205
    • /
    • 2002
  • Information visualization in information retrieval is a creating tool that enables us to observe, manipulate, search, navigate, explore, filter, discover, understand, interact with large volumes of data for more rapidly and far more effectively to discover hidden patterns. The focus of this study is to investigate and analyze information visualization techniques in information retrieval system in the three-schematic levels. In result, it was found that first, scientific data, documents, and retrieval result information are visualized through various techniques. Second, information visualization techniques which facilitate navigation and interaction are zoom and pan, focus+context techniques, incremental exploration, and clustering. Third, the visual metaphors used by the visualization systems are presented in the linear structure, hierarchy structure, network structure, and vector scatter structure.

A Study on the Development of Test Facility for Safety System Software V/V in Nuclear Power Plant (원자력발전소 안전계통 소프트웨어의 확인/검증을 위한 시험장치 개발에 관한 연구)

  • Lee, Sun-Sung;Suh, Young;Moon, Chae-Joo
    • Journal of Energy Engineering
    • /
    • v.7 no.1
    • /
    • pp.96-102
    • /
    • 1998
  • The use of computers as part of nuclear safety systems elicits additional requirements-software verification and validation (v/v), hardware qualification-not specifically addressed in general industry fields. The computer used in nuclear power plants is a system that includes computer hardware, software, firmware, and interfaces. To develop the computer systems graded with nuclear safety class, the developing environments have to be required in advance and the developed software have to be verified and validated in accordance with nuclear code and standards. With this requirements, the test facility for Inadequate Core Cooling Monitoring System (ICCMS) as one of safety systems in the nuclear power plants was developed. The test facility consists of three(3) parts such as Input/Output (I/O) simulator, Plant Data Acqusition System (PDAS) cabinets and supervisory computer. The performance of the system was validated by manual test procedure.

  • PDF