• Title/Summary/Keyword: Data Acquisition Devices

Search Result 184, Processing Time 0.025 seconds

A Study on the Development of High Precision Cam Profile Measuring System using Laser Interferometer (레이저를 이용한 캠 프로파일 정밀 측정 장치 개발에 관한 연구)

  • Lim S.H.;Lee C.M.;Jung J.Y.;Yoon S.D.;Shin S.H.;Shin S.W.;Hwang Y.K.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.267-268
    • /
    • 2006
  • Cam mechanisms are one of the most popular devices for generating irregular motion and are widely used in many industrial areas. The purpose of this study is the development of high precision measuring system fur measurement data acquisition and analysis of a manufactured cam profile. The developed system is composed of servo motor, CNC controller, rotary encoder, and laser interferometer And also, this system is non-contact measuring type. The developed system takes only 5 minutes to measure a cam profile and to analyze the measuring data while the CMM(coordinate measuring machine) takes about 1 hours even by a skilled operator.

  • PDF

All-In-One Observing Software for Small Telescope

  • Han, Jimin;Pak, Soojong;Ji, Tae-Geun;Lee, Hye-In;Byeon, Seoyeon;Ahn, Hojae;Im, Myungshin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.2
    • /
    • pp.57.2-57.2
    • /
    • 2018
  • In astronomical observation, sequential device control and real-time data processing are important to maximize observing efficiency. We have developed series of automatic observing software (KAOS, KHU Automatic Observing Software), e.g. KAOS30 for the 30 inch telescope in the McDonald Observatory and KAOS76 for the 76 cm telescope in the KHAO. The series consist of four packages: the DAP (Data Acquisition Package) for CCD Camera control, the TCP (Telescope Control Package) for telescope control, the AFP (Auto Focus Package) for focusing, and the SMP (Script Mode Package) for automation of sequences. In this poster, we introduce KAOS10 which is being developed for controlling a small telescope such as aperture size of 10 cm. The hardware components are the QHY8pro CCD, the QHY5-II CMOS, the iOptron CEM 25 mount, and the Stellarvue SV102ED telescope. The devices are controlled on ASCOM Platform. In addition to the previous packages (DAP, SMP, TCP), KAOS10 has QLP (Quick Look Package) and astrometry function in the TCP. QHY8pro CCD has RGB Bayer matrix and the QLP transforms RGB images into BVR images in real-time. The TCP includes astrometry function which adjusts the telescope position by comparing the image with a star catalog. In the future, We expect KAOS10 be used on the research of transient objects such as a variable star.

  • PDF

IIoTBC: A Lightweight Block Cipher for Industrial IoT Security

  • Juanli, Kuang;Ying, Guo;Lang, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.97-119
    • /
    • 2023
  • The number of industrial Internet of Things (IoT) users is increasing rapidly. Lightweight block ciphers have started to be used to protect the privacy of users. Hardware-oriented security design should fully consider the use of fewer hardware devices when the function is fully realized. Thus, this paper designs a lightweight block cipher IIoTBC for industrial IoT security. IIoTBC system structure is variable and flexibly adapts to nodes with different security requirements. This paper proposes a 4×4 S-box that achieves a good balance between area overhead and cryptographic properties. In addition, this paper proposes a preprocessing method for 4×4 S-box logic gate expressions, which makes it easier to obtain better area, running time, and power data in ASIC implementation. Applying it to 14 classic lightweight block cipher S-boxes, the results show that is feasible. A series of performance tests and security evaluations were performed on the IIoTBC. As shown by experiments and data comparisons, IIoTBC is compact and secure in industrial IoT sensor nodes. Finally, IIoTBC has been implemented on a temperature state acquisition platform to simulate encrypted transmission of temperature in an industrial environment.

Human hand gesture identification framework using SIFT and knowledge-level technique

  • Muhammad Haroon;Saud Altaf;Zia-ur- Rehman;Muhammad Waseem Soomro;Sofia Iqbal
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1022-1034
    • /
    • 2023
  • In this study, the impact of varying lighting conditions on recognition and decision-making was considered. The luminosity approach was presented to increase gesture recognition performance under varied lighting. An efficient framework was proposed for sensor-based sign language gesture identification, including picture acquisition, preparing data, obtaining features, and recognition. The depth images were collected using multiple Microsoft Kinect devices, and data were acquired by varying resolutions to demonstrate the idea. A case study was designed to attain acceptable accuracy in gesture recognition under variant lighting. Using American Sign Language (ASL), the dataset was created and analyzed under various lighting conditions. In ASL-based images, significant feature points were selected using the scale-invariant feature transformation (SIFT). Finally, an artificial neural network (ANN) classified hand gestures using specified characteristics for validation. The suggested method was successful across a variety of illumination conditions and different image sizes. The total effectiveness of NN architecture was shown by the 97.6% recognition accuracy rate of 26 alphabets dataset with just a 2.4% error rate.

Sustaining the Use of Quantified-Self Technology: A Theoretical Extension and Empirical Test

  • Ayoung Suh
    • Asia pacific journal of information systems
    • /
    • v.28 no.2
    • /
    • pp.114-132
    • /
    • 2018
  • Quantified-self technologies (QSTs) provide functions for users to collect, track, and monitor personal data for self-reflection and acquisition of self-knowledge. Although QSTs require prolonged use to reap the attendant benefits, many users stop using their devices or tracking within weeks or months. To address this issue, this study seeks to determine ways to sustain the use of QSTs. Combining motivational affordance theory with technology continuance theory, this study develops a theoretical model that accounts for an individual's continued intention to use a QST. Within the proposed model, unique QST affordances were identified as antecedents of individual motivation in relation to technology continuance, and their different roles in stimulating hedonic, utilitarian, and eudaimonic motivations were examined. The model was tested using data collected from 180 QST users. Results demonstrate that although utilitarian and eudaimonic motivations are complementary forces in determining continuance intention, hedonic motivation loses its predictive power in favor of eudaimonic motivation. Tracking, visualizing, and sharing affordances play different roles in elevating user motivations. The sharing affordance does not influence utilitarian and eudaimonic motivations, but it positively influences hedonic motivation. This research contributes to the literature on technology continuance by shifting scholarly attention from hedonic-utilitarian duality to eudaimonic motivation, characterized by meaning, self-growth, and pursuit of excellence.

Method of Biological Information Analysis Based-on Object Contextual (대상객체 맥락 기반 생체정보 분석방법)

  • Kim, Kyung-jun;Kim, Ju-yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.41-43
    • /
    • 2022
  • In order to prevent and block infectious diseases caused by the recent COVID-19 pandemic, non-contact biometric information acquisition and analysis technology is attracting attention. The invasive and attached biometric information acquisition method accurately has the advantage of measuring biometric information, but has a risk of increasing contagious diseases due to the close contact. To solve these problems, the non-contact method of extracting biometric information such as human fingerprints, faces, iris, veins, voice, and signatures with automated devices is increasing in various industries as data processing speed increases and recognition accuracy increases. However, although the accuracy of the non-contact biometric data acquisition technology is improved, the non-contact method is greatly influenced by the surrounding environment of the object to be measured, which is resulting in distortion of measurement information and poor accuracy. In this paper, we propose a context-based bio-signal modeling technique for the interpretation of personalized information (image, signal, etc.) for bio-information analysis. Context-based biometric information modeling techniques present a model that considers contextual and user information in biometric information measurement in order to improve performance. The proposed model analyzes signal information based on the feature probability distribution through context-based signal analysis that can maximize the predicted value probability.

  • PDF

Data Reduction and Analysis of the Resonant Column Testing Based on the Equation of Motion (운동방정식에 기초한 공진주 실험의 자료분석 및 해석)

  • 조성호;강태호
    • Journal of the Korean Geotechnical Society
    • /
    • v.19 no.4
    • /
    • pp.133-144
    • /
    • 2003
  • The resonant column testing is a laboratory testing method to determine the shear modulus and material damping factor of soils. The method has been widely used for many applications and its importance has increased. Since the first use of the testing method in 1960's, the low-technology electronic devices fir testing and data acquisition have limited the measurement only to the amplitude of the linear spectrum. The limitations of the testing method are also attributed to the assumption of linear-elastic material in the theory of the resonant column testing and also to the incomplete understanding of the dynamic behaviour of the resonant column testing device. Recently, Joh et al. proposed a theory to overcome the limitations of the resonant column testing by deriving the equation of motion and providing its solution for the resonant column testing device. This study proposed the improved data reduction and analysis method for the resonant column testing, thanks to the advanced data acquisition system and the new theoretical solution for the resonant column testing system. For the verification of the proposed data reduction and analysis method, the numerical simulation of the resonant column testing was performed by the finite element analysis. Also, a series of resonant column testing were performed fir Joomunjin sand, which verified the feasibility of the proposed method and revealed the limitations of the conventional data reduction and analysis method.

Development of geoData Aquisition System for Panoramic Image Contents Service based on Location (위치기반 파노라마 영상 콘텐츠 서비스를 위한 geoData 취득 및 처리시스템 개발)

  • Cho, Hyeon-Koo;Lee, Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.438-447
    • /
    • 2011
  • geoContents have been closely related with personal life since the Google Earth and Street View by Google and the Road View by Daum were introduced. So, Location-based content, which is referred to geoContents, involving geometric spacial information and location-based image information is a sharp rise in demand. A mobile mapping system used in the area of map upgrade and road facility management has been having difficulties in satisfying the demand in the cost and time for obtaining these kinds of contents. This paper addresses geoData acquisition and processing system for producing panoramic images. The system consists of 3 devices: the first device is 3 GPS receivers for acquiring location information which is including position, attitude, orientation, and time. The second is 6 cameras for image information. And the last is to synchronize the both data. The geoData acquired by the proposed system and the method for authoring geoContents which are referred to a panoramic image with position, altitude, and orientation will be used as an effective way for establishing the various location-based content and providing them service area.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation (모바일 포렌식 증거능력 확보 방안 연구)

  • Eo, Soowoong;Jo, Wooyeon;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.135-152
    • /
    • 2016
  • Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.