• Title/Summary/Keyword: Device ID

Search Result 155, Processing Time 0.027 seconds

Caller ID Implementation Using Linux Embedded System (리눅스 임베디드 시스템을 이용한 Caller ID 구현)

  • Kim, Hyoung-Bae;Lee, Seok-Won;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2732-2734
    • /
    • 2001
  • 본 연구에서는 리눅스를 임베디드 시스템에 포팅하기 위한 기술을 조사하고 하드웨어를 선정하여 리눅스를 포팅하였다. 하드웨어는 Intel 사의 StrongARM SA-1110를 탑재한 Evaluation board를 사용하였다. 개발 환경은 Host computer와 Assabet board상에 RS-232C를 이용하여 프로그램 다운로드할 수 있는 환경을 구축하였다. StrongARM를 위한 Cross Compiler를 만들고, StrongARM의 하드웨어 메모리 맵을 이용하여 Linux의 메모리 맵을 설정한 후 리눅스를 컴파일하였다. 이를 RS-232C를 통해 Assabet board에 다운로드하여 리눅스를 탑재한 임베디스 시스템을 구현하였다. UCB1300 telecom codec의 device driver를 개발하여 커널에 적재하고 이를 사용하여 전화기로부터 들어오는 신호중 CID 신호를 해석하여 발신자 번호를 출력하는 시스템을 구현하였다.

  • PDF

Development of a Localization System Based on VLC Technique for an Indoor Environment

  • Yi, Keon Young;Kim, Dae Young;Yi, Kwang Moo
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.436-442
    • /
    • 2015
  • In this paper, we develop an indoor localization device which embeds localization information into indoor light-emitting-diodes (LED) lighting systems. The key idea of our device is the use of the newly proposed "bit stuffing method". Through the use of stuff bits, our device is able to measure signal strengths even in transient states, which prohibits interference between lighting signals. The stuff bits also scatter the parts of the signal where the LED is turned on, thus provides quality indoor lighting. Additionally, for the indoor localization system based on RSSI and TDM to be practical, we propose methods for the control of LED lamps and compensation of received signals. The effectiveness of the proposed scheme is validated through experiments with a low-cost implementation including an indoor navigation task.

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계

  • Lee, Gyeong-Jeon;Jeong, Mu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.226-233
    • /
    • 2005
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. So when you try to define it with simple words, it gets even more confusing. Payment. however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. In the end, the key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, Strong Personal Device, and peer-based if information transactions. We also propose U-SDT Protocol integrating critical technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

Dependence of Analog and Digital Performance on Carrier Direction in Strained-Si PMOSFET (Strained-Si PMOSFET에서 디지털 및 아날로그 성능의 캐리어 방향성에 대한 의존성)

  • Han, In-Shik;Bok, Jung-Deuk;Kwon, Hyuk-Min;Park, Sang-Uk;Jung, Yi-Jung;Shin, Hong-Sik;Yang, Seung-Dong;Lee, Ga-Won;Lee, Hi-Deok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.8
    • /
    • pp.23-28
    • /
    • 2010
  • In this paper, comparative analysis of digital and analog performances of strained-silicon PMOSFETs with different carrier direction were performed. ID.SAT vs. ID.OFF and output resistance, Rout performances of devices with <100> carrier direction were better than those of <110> direction due to the greater carrier mobility of <100> channel direction. However, on the contrary, NBTI reliability and device matching characteristics of device with <100> carrier direction were worse than those with <110> carrier direction. Therefore, simultaneous consideration of analog and reliability characteristics as well as DC device performance is highly necessary when developing mobility enhancement technology using the different carrier direction for nano-scale CMOSFETs.

Implementation of the Environment for Mobile HMI Communication Settings Based on QR Code

  • Kim, Jong-Joo;Kim, Jae-Woong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.139-145
    • /
    • 2022
  • As products that consumers want become more diverse, the types of automation equipment are becoming more diverse and advanced to produce competitive products. In general, equipment is manufactured with built-in interface devices (HMI) for users so that operators can efficiently monitor and operate equipment quickly. Because HMI devices are connected to various industrial controllers, elements such as communication protocols of various controllers must be understood and set up in the design stage. Non-experts not only have difficulty choosing compatible items among various protocols, but also have limitations in integrating and operating on one device because screens and settings are statically assigned. This paper proposes a model that can scan information such as equipment ID and communication protocol with QR code using a mobile device, access industrial controller, and remotely operate the displayed equipment screen. The proposed model is expected to increase efficiency in inspection and management of automated equipment as it can easily set, monitor, and operate the communication environment of various automated equipment using one mobile device.

A Study on FTN Decoding Method for High Throughput Satellite Communication (고전송율 위성통신을 위한 FTN 신호 복호 기법 연구)

  • Kwon, Hae-Chan;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.211-216
    • /
    • 2014
  • In this paper, high throughput method is studied to provide floating objects with broadband service as ship by using satellite. In recent, satellite broadcastings standard is based on DVB-S3 for communication service using wireless device on navigation communication by satellite. LDPC codes are iterative coding algorithm proposed in DVB-S3. In this paper, FTN technique is applied to LDPC codes with 8-PSK modulation and then present the method to alleviate performance degradation due to FTN through BICM-ID. BICM-ID is the method to improve performance by calculating a new LLR from hard-decision value of decoder output. DVB-S2 system with 8-PSK modulation and FTN technique based on iterative decoding had a better performance than DVB-S2 with 8-PSK modulation and FTN technique over Gaussian channels.

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

ID-based Authentication Schemes with Forward Secrecy for Smart Grid AMI Environment (스마트그리드 AMI 환경을 위한 전방 보안성이 강화된 ID기반 인증 기법)

  • Park, Dae-Il;Yeo, Sang-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.736-748
    • /
    • 2013
  • In this paper, we analyse the vulnerabilities of KL scheme which is an ID-based authentication scheme for AMI network, and propose two kinds of authentication schemes which satisfy forward secrecy as well as security requirements introduced in the previous works. In the first scheme, we use MDMS which is the supervising system located in an electrical company for a time-synchronizing server, in order to synchronize smart grid devices in home, and we process device authentication with a new secret value generated by OTP function every session. In the second scheme, we use a secret hash-chain mechanism for authentication process, so we can use a new secret value every session. The proposed two schemes have strong points and weak points respectively and those depend on the services area and its environment, so we can select one of them efficiently considering real aspects of AMI environment.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

New NH-O Oxidation method (II)-For the Electrical properties of Device. (새로운 $NH_{3}-O_{2}$ 산화 방법(II)-소자의 전기적 특성)

  • Jeong, Seong-An;Park, Sun-Woo;Kim, Chul-Ju
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.363-366
    • /
    • 1988
  • A new $NH_{3}-O_{2}$ oxidation method was estimated by the electrical properties of the fabricated n-MOS transistor. For the C-V characteristic curves the Qox are almost equal to Qss and no hysteresis phenomena are observed. The Id-Vds characteristics show that $NH_{3}-O_{2}$ oxidation method is superior to Dry oxidation.

  • PDF