• Title/Summary/Keyword: Device Convergence

Search Result 1,682, Processing Time 0.025 seconds

Development of User Oriented Vulnerability Analysis Application on Smart Phone (사용자 중심의 스마트폰 보안 취약성 분석 어플리케이션 개발)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.2
    • /
    • pp.7-12
    • /
    • 2012
  • An advanced and proactive response mechanism against diverse attacks should be proposed for enhance its security and reliability on android based commercial smart work device. In this study, we propose a user-oriented vulnerability analysis and response system on commercial smart work device based on android when diverse attacks are activated. Proposed mechanism uses simplified and optimized memory for monitoring and detecting the abnormal behavior on commercial smart work device, with which we can find and determine the attacker's attempts. Additionally, proposed mechanism provides advanced vulnerability analysis and monitoring/control module.

Simulation Study of Blood Perfusion according to Outflow Cannulation Site of Left Ventricular Assist Device (좌심실보조장치의 출구 캐뉼라의 삽관 위치에 따른 혈액관류에 대한 시뮬레이션 연구)

  • Jee, In Hyeog;Kim, Hyeong Gyun;Lim, Ki Moo
    • Journal of Biomedical Engineering Research
    • /
    • v.36 no.4
    • /
    • pp.135-142
    • /
    • 2015
  • Outflow cannulation site of left ventricular assist device(LVAD) chosen by considering anatomical structure of thoracic cavity and vascular system. Though outflow cannulation site influences blood perfusion at each branch, there is no standard rule or quantitative data. In this study, we computed the amount of blood perfusion at each arterial branch numerically according to outflow cannulation sites(ascending aorta, aortic arch, descending aorta). We generated computational meshes to the three-dimensionally reconstructed arterial system. Clinically measured arterial pressure were used for inlet boundary condition, porous media were applied to mimic blood flow resistance. Blood perfusion through left common carotid artery was 2.5 times higher than other cases, and that through right common carotid artery was 1.1 times higher than other branches. Although this is simulation study, will be useful reference data for the clinical study of LVAD which considers blood perfusion efficiency.

User Authentication Using Biometrics and OTP in Mobile Device (중소기업형 바이오정보와 OTP를 이용한 사용자 인증)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.27-31
    • /
    • 2014
  • According to increasing of payment and settlements like smart banking, internet shopping and contactless transaction in smart device, the security issues are on the rise, such as the vulnerability of the mobile OS and certificates abuse problem, we need a secure user authentication. We apply the OTP using biometrics and PKI as user authentication way for dealing with this situation. Biometrics is less risk of loss and steal than other authentication that, in addition, the security can be enhanced more when using the biometric with OTP. In this paper, we propose a user authentication using biometrics and OTP in the mobile device.

  • PDF

A Study on the Seeker Technology in Guided Weapon System (유도무기체계 탐색기 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.103-109
    • /
    • 2008
  • In this paper, a study on the seeker technology in guided weapon system development. Seeker is guided weapons mounted on the device that is targeted for implementation homing guided looking for confirmation of the target after picking up, tracking, command, induce calculations necessary to induce the target's direction or control device to provide location information to perform a series of features. Therefore, the Seeker is guided weapons systems and important device that determines the performance of one guided control. Explorer is a tactical and strategy guided weapons from different goals and specifications of weapons systems development and encourage economic efficiency, Interoperability, designed to improve the reliability and hit requirements and the more numerous. Therefore, this research through the Explorer's attributes and weapons systems encourage the development direction of the technical details of the offer.

  • PDF

A Study on Intelligent Jobs Information Recommendation Algorithm for a Mobile Environment (모바일 환경을 위한 지능형 일자리 정보 추천 알고리즘에 관한 연구)

  • Jeon, Dong-Pyo;Jeon, Do-Hong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.167-179
    • /
    • 2008
  • As ubiquitous technology develops, there are many studies to provide various contents proper to users through a mobile device. However, there is a limit of information provision due to a small user interface of a mobile device. This study proposes a system that can solve a problem and provide an intelligent agent model appropriate to a mobile environment and job information positively that an individual user is interested. It is composed of a personalization engine to monitor users' behavior patterns and a learning algorithm to provide information to a mobile device. Analysis shows that preferred job items are different by sex, age and education, while a region affects job searching significantly.

  • PDF

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

Design and Implementation of the Dual Motor Drive AGV Controller Using CPLD (CPLD를 이용한 이륜 속도차방식 AGV 제어기 설계 및 구현)

  • 진중호;백한석;한석붕
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.209-212
    • /
    • 2000
  • This paper describes the design and implementation of a hard- wired AGV controller using CPLD(Complex Programmable Logic Device). The proposed controller manages a guidance equipment, motor and I/O sequence controller for a self-control traveling. Compared with a conventional $\mu$-processor, the CPLD controller using a hard-wired control method can reduce a difficult programming process. Also, the total costs of production are reduced, such as development time, product's size and difficulty because memory, combinational logic and sequential logics are implemented by CPLD. The Controller designed using behavioral description method with VHDL and was synthesized by MAX+Plus II of the ALTERA co. We implemented controller using EPF10K10LC84-4 device.

  • PDF

Face Detection based on Matched Filtering with Mobile Device (모바일 기기를 이용한 정합필터 기반의 얼굴 검출)

  • Yeom, Seok-Won;Lee, Dong-Su
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.76-79
    • /
    • 2014
  • Face recognition is very challenging because of the unexpected changes of pose, expression, and illumination. Facial detection in the mobile environments has additional difficulty since the computational resources are very limited. This paper discusses face detection based on frequency domain matched filtering in the mobile environments. Face detection is performed by a linear or phase-only matched filter and sequential verification stages. The candidate window regions are selected by a number of peaks of the matched filtering outputs. The sequential stages comprise a skin-color test and an edge mask filtering tests, which aim to remove false alarms among selected candidate windows. The algorithms are built with JAVA language on the mobile device operated by the Android platform. The simulation and experimental results show that real-time face detection can be performed successfully in the mobile environments.

Three-Dimensional Selective Oxidation Fin Channel MOSFET Based on Bulk Silicon Wafer (벌크 실리콘 기판을 이용한 삼차원 선택적 산화 방식의 핀 채널 MOSFET)

  • Cho, Young-Kyun;Nam, Jae-Won
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.159-165
    • /
    • 2021
  • A fin channel with a fin width of 20 nm and a gradually increased source/drain extension regions are fabricated on a bulk silicon wafer by using a three-dimensional selective oxidation. The detailed process steps to fabricate the proposed fin channel are explained. We are demonstrating their preliminary characteristics and properties compared with those of the conventional fin field effect transistor device (FinFET) and the bulk FinFET device via three-dimensional device simulation. Compared to control devices, the three-dimensional selective oxidation fin channel MOSFET shows a higher linear transconductance, larger drive current, and lower series resistance with nearly the same scaling-down characteristics.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.