• Title/Summary/Keyword: Device identification

Search Result 390, Processing Time 0.021 seconds

Clinical Application of DIAGNOcam (DIAGNOcam의 임상적 적용)

  • Kim, Jinhyock;Kim, Jongsoo
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.43 no.4
    • /
    • pp.461-466
    • /
    • 2016
  • Dental caries is an important dental disease among children and adolescents that can continue for a lifetime. Early detection of dental caries in deciduous dentition is significant because it can influence the permanent teeth. It is also critical to prevent dental caries by performing fluoride treatment and pit-and-fissure sealant for high-risk children. Various methods have been developed for the early detection of dental caries; however, many studies are still seeking to discover more effective methods. In general, visual examination and radiographic images are used, but these techniques have several limitations such as errors and radiation exposure. In this study, clinical application of the newly developed DIAGNOcam caries identification device and its possible applications were examined. DIAGNOcam was applied to diagnose dental caries in the posterior teeth of patients in the Department of Pediatric Dentistry, and it was confirmed that it could be used to detect proximal caries, the margin of restoration, and the extent of dental caries lesions.

Windows based PC Log Collection System using Open Source (오픈소스를 이용한 윈도우 기반 PC 로그 수집 시스템)

  • Song, Jungho;Kim, Hakmin;Yoon, Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.332-337
    • /
    • 2016
  • System administrator or security managers need to collect logs of computing device (desktop or server), which are used for the purpose of cause-analysis of security incident and discover if damage to system was either caused by hacking or computer virus. Furthermore, appropriate log maintenance helps preventing security breech incidents through identification of vulnerability. In addition, it can be utilized for prevention of data leakage through the insider. In the paper, we present log collection system developed using open source supported by commands and basic methods of Windows. Furthermore, we aim to collect log information to enable search and analysis from diverse perspectives and to propose a way to integrate with open source-based search engine system.

Estimation of Motion-Blur Parameters Based on a Stochastic Peak Trace Algorithm (통계적 극점 자취 알고리즘에 기초한 움직임 열화 영상의 파라메터 추출)

  • 최병철;홍훈섭;강문기
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.281-289
    • /
    • 2000
  • While acquiring images, the relative motion between the imaging device and the object scene seriously damages the image quality. This phenomenon is called motion blur. The peak-trace approach, which is our recent previous work, identifies important parameters to characterize the point spread function (PSF) of the blur, given only the blurred image itself. With the peak-trace approach the direction of the motion blur can be extracted regardless of the noise corruption and does not need much Processing time. In this paper stochastic peak-trace approaches are introduced. The erroneous data can be selected through the ML classification, and can be made small through weighting. Therefore the distortion of the direction in the low frequency region can be prevented. Using the linear prediction method, the irregular data are prohibited from being selected as the peak point. The detection of the second peak using the proposed moving average least mean (MALM) method is used in the Identification of the motion extent. The MALM method itself includes a noise removal process, so it is possible to extract the parameters even an environment of heavy noise. In the experiment, we could efficiently restore the degraded image using the information obtained by the proposed algorithm.

  • PDF

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

Usability Evaluation of the Touch Keys for the Smart Watch (스마트 워치 터치스크린에서의 터치 키에 대한 사용성 연구)

  • Kim, Su Young;Ban, Kimin;Choe, Jaeho;Jung, Eui S.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.225-232
    • /
    • 2015
  • The smart watch is the most popular wearable computing device because it takes a form of wristwatch. Many smart watches have adopted the touch screen interface due to the limited size of display. This paper focuses on touch key size and spacing that affect the usability about the touch key of smart watch. The experiments were made for four touch key sizes (width${\times}$height; $5{\times}5$, $5{\times}7$, $7{\times}5$, $7{\times}7mm$) and nine touch key spacing (vertical${\times}$horizontal; $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, $3{\times}3mm$). The completion time, error rate, control discomfort and identification discomfort were measured. The touch key size $7{\times}7$, $7{\times}5$ and the touch key spacing $3{\times}3$, $1{\times}3$ provided the best results in terms of the completion time and the control discomfort, while the square touch key ($7{\times}7$, $5{\times}5$) provided the best performance for the error rate measure. The result of this study can help ergonomically design the touch interface of the smart watch.

A single slotted morphing flap based on SMA technology

  • Ameduri, Salvatore;Concilio, Antonio;Pecora, Rosario;Karagiannis, Dimitrios
    • Smart Structures and Systems
    • /
    • v.17 no.5
    • /
    • pp.819-835
    • /
    • 2016
  • In this paper, the activities carried out within the EU funded Clean Sky Joint Technology Initiative (JTI GRA) Project and aimed at developing a morphing flap, are illustrated. The reference device is a regional aircraft single slotted flap, enhanced with deforming capabilities to obtain improved hyper-lift performance. The design started with the identification of the internal architecture, intended to allow camber variations. A concentrated-hinge architecture was selected, for its ability to fit different curvatures and for the possibility of easily realizing an "armadillo-like" configuration, then avoiding the use of a complicate deformable skin. The flap layout is made of segmented ribs, elastically hinged each other and span-wise connected by conventional spars. Relative rotations of the rib elements are forced by SMA structural actuators, i.e., cooperating in the external loads absorption. Super-elastic SMA are used to make up recovery elastic elements, necessary to regain the original shape after activation. These further elements in turn contribute to the overall flap rigidity. After assessing the hinge number and the size of the SMA active and passive elements, the advanced design phase was dealt with. It was aimed at solving manufacturing issues and producing the executive drawings. The realized demonstrator was finally tested in lab conditions to prove its functionality in terms of whether target shape actuation or attained shape preservation under loads. On the basis of the numerical results and the experimental outcomes, precious hints were obtained for further developments of the concept.

App-based 2-channel User Authentication Scheme for Multiple Application Systems (다중 응용시스템용 앱기반 2-채널 사용자 인증방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.141-148
    • /
    • 2018
  • Currently, the user authentication technology used by users to access multiple applications within an organization is being applied with ID/PW-based SSO technology. These user authentication methods have the fundamental disadvantages of ID/PW and SSO. This means that security vulnerabilities in ID/PW can lead to periodic changes in PWs and limits on the number of incorrect PW inputs, and SSO adds high cost of the SSO server, which centrally stores the authentication information, etc. There is also a fundamental vulnerability that allows others to freely use other people's applications when they leave the portal application screen with SSO. In this paper, we proposed an app-based 2-channel authentication scheme to fundamentally eliminate problems with existing ID/PW-based SSO user authentication technologies. To this end, it distributed centralized user authentication information that is stored on SSO server to each individual's smartphone. In addition, when users access a particular application, they are required to be authenticated through their own smartphone apps.

Study on the Ambiguity Difference Adjustment between Reference Station Cells for the Improvement in Rover's Continuous Network-RTK Positioning (Network RTK 항체의 불연속 위치 결정 개선을 위한 기준국 셀간 미지정수 차이 조정 연구)

  • Park, Byung-Woon;Song, June-Sol;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.619-626
    • /
    • 2012
  • One-way Network-RTK(Real Time Kinematics) is considered as a method which can satisfy moving vehicle's recently-required high accuracy and mobility. When we use one-way Network RTK for vehicle navigation, multiple cells-based system is required to provide the service continuously in wide area. The rover which moves through various cells inevitably experiences a correction discontinuity, which is not eliminated by the DD(Double Difference) method and to cause 13cm(horizontal) and 48cm(vertical) position error. We suggest three solutions to reduce this discontinuity, which are identification of master RS with neighbor networks, duplication of communication module to receive corrections from other cells, and ambiguity adjustment between neighbor cells. All of our suggestions reduce the error to 1/4 wavelength in measurement and 3cm in position-domain, and we suggest the ambiguity adjustment is the best when we consider the extendibility of service area and the cost of rover device.

Development of Clinical Protocol for Acquisition of Change of Radial Pulse Wave Signal in the Cold-Heat Intervention: Explanatory, Randomized, 2×2 cross-over design (냉온 부하에 따른 요골동맥 맥파의 변화 특성을 파악하기 위한 무작위 배정·2×2교차설계 탐색적 임상시험계획서 개발)

  • Yu, Hana;Kim, Jihye;Ku, Boncho;Kim, Hyunho;Jeon, Youngju
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.19 no.2
    • /
    • pp.91-100
    • /
    • 2015
  • Objectives The aim of this study is to develop a structured clinical protocol related with acquisition of radial pulse wave in the randomized, $2{\times}2$ cross-over design, and cold-heat intervention trial for a pilot and preliminary study. Methods The protocol was contrived based on wide ranging literature searches for cold-heat intervention experiments and radial pulse diagnoses. Results Sample size of 60 subjects was calculated based on an effect size derived from the previous study designed to detect the pre-post cold-heat differences in the radial pulse. Each subjects will be randomly assigned to the cold (first) to heat (last) group (n=30) or heat (first) to cold (last) group (n=30). All subjects will fill out a case report form and questionnaires related with pattern identification, dietary patterns, sleep quality, and physical activity will be surveyed and used as a secondary outcomes. Safety assessment will be reported at the final stage. Conclusions This protocol will provide an additional reference to future studies related with observation of radial pulse during any interventions and also expect to be used as a guideline for acquisition of reliable radial pulse wave data.

Implementation of Digital Selective Calling Function for the Very High Frequency Radio telephone using the Automatic Identification System (선박자동식별장치를 이용한 초단파무선전화의 디지털선택호출 기능 구현)

  • Lee, Ju-Han;Yim, Jae-Hong;Lim, Jung-Gyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2232-2240
    • /
    • 2017
  • IMO has made AIS and VHF mandatory for international sailing vessels through SOLAS, and korea if mandating specific vessels through the law for safety of vessels and the ship installation technology standards. However, due to various communication equipments and complicated usage method, malfunction occurs, and the response delay to the actual structure signal often causes human accidents. So recently, as a part of GMDSS modernization, maritime communication devices are attempting to interwork and integrate different types of marine communication system in order to construct a next generation maritime communication system. In this paper, we describe a technique to implement the DSC function by interlocking and integrating the AIS device and VHF. We will present the basis for achieving domestic technical standards and standardization through the linking algorithm of the data that can extract the ship information from AIS and utilize it the DSC function of VHF.