• Title/Summary/Keyword: Digital Devices

Search Result 2,183, Processing Time 0.034 seconds

Home Gateway Architecture for Realtime Multimedia Distribution in Home Networking (실시간 멀티미디어의 분배를 위한 홈게이트웨이 구조)

  • 이동욱;이철호;한상우;김종원;조충래;전용일
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.509-512
    • /
    • 2003
  • On-going convergence between broadcasting and communication is currently bringing in lots of drastic changes to multimedia services to the home. The FTTH-based home networks will be the interface among the digital home appliances for broadcast digital contents as weil as for broadband data connection. In this paper, we discuss several design issues for home gateway architecture that effectively distributes realtime broadcasting contents (from either the headend in the access network or the satellite/terrestrial broadcasts) to heterogeneous devices in the home network.

  • PDF

Hardware Realization of a Real Time 2-D Digital Homomorphic Filter (실시간 2차원 디지털 호모모프필터의 하드웨어구현)

  • 안상호;권기룡;송규익;김덕규;이건일
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.4
    • /
    • pp.123-128
    • /
    • 1994
  • Hardware realization of a digital 2-D homomorphic filter for real time contrast enhancement of video signal is presented. In homomorphic filter, logarithmic and exponential conversion used the memory lookup table method and because the hardware is implemented by multiplierless TTL devices, it can be designed to specific IC. The contrast gain can be controlled externally and the transfer function of homomorphic filter can be easily varied by the change of lookup table memory data.

  • PDF

The Study on Implementation of Receiver for Terrestrial DMB (지상파 DMB방송 수신기 개발에 관한 연구)

  • Won, Young-Jin;Na, Hee-Su
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.1011-1012
    • /
    • 2006
  • In this paper, implementation process of standard platform for T-DMB Receiver in low-cost and small-size are following: First, implement SoC for 32 bit RISC CPU and 16 bit DSP, Hardware H.264 CODEC, Post Processor or Video Display, Audio Processor, I/O Device. Second, implement Real Time OS for flexible application. Third, propose simple architecture for interface with peripheral devices using one-chip processor.

  • PDF

A Study on the Digital Convergence Paradigm and Participation in Digital Contents Services (디지털컨버전스 패러다임과 디지털콘텐츠 서비스 참여에 관한 연구)

  • Kim, Yeon-Jeong
    • Journal of Families and Better Life
    • /
    • v.27 no.6
    • /
    • pp.243-253
    • /
    • 2009
  • This study identifies the concept of a digital convergence paradigm, which deals with the relationship among convergence and consumer participation, digital contents services, and the culture of consumption (web 2.0). This research was conducted using a quantitative method involving focus group interviews (FGI) and literature reviews. This research examines the relationship between convergence and consumer participation and the adoption of a concept of "convergence culture", which is categorized as "collective intelligence" and "intellectual community participation". The role of the consumer has changed from one of a "consuming consumer" to that of a "collaborating consumer" and finally to the concept of a consumers as the originator of a new consumption culture. In the study, the consumption culture of web participants indicated the characteristics of funology, self-expression, life-catching, quick-tempered, immersion(arousal), sharing culture, multitasking, and cyber justice. The recognition level of networking on the "digital convergence" of the consumer was identified as that of the combination of IT(information technology); product and multi-services or alliance of industry groups(telecom, broadband, IPTV service); or the use of one source with multiple devices.

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Computerizing Clinical Laboratory with Clinical Devices Interface : I. With a focus on ABGA(Arterial Blood Gas Analyzer) (임상 의료장비 인터페이스를 이용한 검사실 전산화 구현 : I. ABGA(Arterial Blood Gas Analyser)를 중심으로)

  • Kim, Sun-Chil;Kwon, Deok-Moon
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.8 no.1
    • /
    • pp.21-26
    • /
    • 2006
  • Hospitals these days are trying to introduce the a practice has recently been generalized in the test or diagnosis process, where test results and images from different test labs are interlinked together. This process is identical to that of physical aspect in EMR process, which computerizes the paper results within the hospital. One of the prerequisites for the process of computerizing test results is the interface between clinical test devices in the test labs. However, due to the variety of prescription inputs, disparity of test result papers, complexity of job in test labs and diversify of interfaces among the different devices, interconnection with the hospital information system is a complicated job. A universal control of clinical test devices which have independent communication protocols has become possible by connecting them with an interface workstation. As for the patients, waiting time for test has been reduced, and, thanks to the synchronized result retrieval system, it has become possible to check the test results on the very day of the test. As a result, the length of hospitalization has been reduced, too. In terms of workflow, as the transfer of charts and transfer of result papers are separated, the embarrassing job of collecting result papers has disappeared. As patients' test appointment and the results processing can be made on-line, extra work for doctors have disappeared. And, thanks to the computerization of test results information management, the job of statistical processing has become convenient.

  • PDF

Development of a Customer Management Application and a Mobile Advertisement Model based on PUSH Technology (PUSH 기술 기반 모바일 광고 모델 및 고객관리 앱 개발)

  • Yang, Gi-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.193-199
    • /
    • 2015
  • PUSH technology is a technology that can transfer server information without user's request and it is very useful in various areas along with mobile applications. This paper suggest a suitable application model that can utilizes the PUSH technology and mobile devices by finding a useful area. For this, AdMan, a mobile application which can utilize the PUSH technology and mobile devices has been developed. AdMan is a mobile application that developed once and can be able to run on both Android and iOS based mobile devices, since it was developed by using a tool called m-Bizmaker. AdMan is a customer management and advertisement system that can bring big efficiency by utilizing the PUSH technology and mobile application under the today's mobile environment, and it is a good model of ICT technology application of modern society. As an application that can maximize the utilization of the PUSH technology and mobile devices, AdMan can realize better effectiveness if it run on a PUSH server.

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.