• Title/Summary/Keyword: Electronic Hardware

Search Result 1,036, Processing Time 0.024 seconds

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

Analysis of Diagnosis Algorithm Implemented in TCU for High-Speed Tracked Vehicles (고속 무한궤도 차량용 변속제어기 진단 알고리즘 분석)

  • Jung, Gyuhong
    • Journal of Drive and Control
    • /
    • v.15 no.4
    • /
    • pp.30-38
    • /
    • 2018
  • Electronic control units (ECUs) are currently popular, and have evolved further towards the high-end application of autonomous vehicles in the automotive industry. Such digital technologies have also become widespread, in agriculture and construction equipment. Likewise, transmission control of high-speed tracked vehicles is based on the transmission control unit (TCU), performing complex gear change control functions, and diagnostic algorithms (a TCU's self-diagnostic and reporting capability of malfunction data through CAN communication). Since all functions of TCU are implemented by embedded-software, it is hardly possible to analyze specifications by reverse engineering. In this paper a real-time transmission simulator adaptable to TCU is presented, for analysis of diagnosis algorithm and standards. Signal simulation circuits are deliberately designed considering electrical characteristics of TCU inputs and various analysis tools, such as analog input auto scan function, and global output enable switch, are implemented in software. Test results from hardware-in-the-loop simulator verify tolerance time for each error, as well as cause of fault, error reset conditions.

Development Status of Crowdsourced Ground Vibration Data Collection System Based on Micro-Electro-Mechanical Systems (MEMS) Sensor (MEMS 센서 기반 지반진동 정보 크라우드소싱 수집시스템 개발 현황)

  • Lee, Sangho;Kwon, Jihoe;Ryu, Dong-Woo
    • Tunnel and Underground Space
    • /
    • v.28 no.6
    • /
    • pp.547-554
    • /
    • 2018
  • Using crowdsourced sensor data collection technique, it is possible to collect high-density ground vibration data which is difficult to obtain by conventional methods. In this study, we have developed a crowdsourced ground vibration data collection system using MEMS sensors mounted on small electronic devices including smartphones, and implemented client and server based on the proposed infrastructure system design. The system is designed to gather vibration data quickly through Android-based smartphones or fixed devices based on Android Things, minimizing the usage of resource like power usage and data transmission traffic of the hardware.

Noise Removal using Normal Distribution and Pixel Characteristics in AWGN Environments (AWGN 환경에서 정규분포와 화소특성을 이용한 잡음제거)

  • Cheon, Bong-Won;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.426-428
    • /
    • 2019
  • Digital images are compromised by noise for various reasons, such as camera sensor malfunctions and hardware errors. Since AWGN can be found in most of electronic equipment, AWGN removal is essential in various image processing processes. In this paper, we propose a filter algorithm that eliminates noise considering the pixel characteristics in AWGN environments. In order to compensate this, the filtering range is set considering the distribution of the pixels inside the mask. The output of the filter suitable for each component is adjusted by adding or subtracting the weight according to the normal distribution. Set the output. To evaluate the performance of the proposed algorithm, we compared it with the existing method using simulation.

  • PDF

Design of Low Area Decimation Filters Using CIC Filters (CIC 필터를 이용한 저면적 데시메이션 필터 설계)

  • Kim, Sunhee;Oh, Jaeil;Hong, Dae-ki
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.71-76
    • /
    • 2021
  • Digital decimation filters are used in various digital signal processing systems using ADCs, including digital communication systems and sensor network systems. When the sampling rate of digital data is reduced, aliasing occurs. So, an anti-aliasing filter is necessary to suppress aliasing before down-sampling the data. Since the anti-aliasing filter has to have a sharp transition band between the passband and the stopband, the order of the filter is very high. However, as the order of the filter increases, the complexity and area of the filter increase, and more power is consumed. Therefore, in this paper, we propose two types of decimation filters, focusing on reducing the area of the hardware. In both cases, the complexity of the circuit is reduced by applying the required down-sampling rate in two times instead of at once. In addition, CIC decimation filters without a multiplier are used as the decimation filter of the first stage. The second stage is implemented using a CIC filter and a down sampler with an anti-aliasing filter, respectively. It is designed with Verilog-HDL and its function and implementation are validated using ModelSim and Quartus, respectively.

Development of Vehicle Longitudinal Controller Fault Detection Algorithm based on Driving Data for Autonomous Vehicle (자율주행 자동차를 위한 주행 데이터 기반 종방향 제어기 고장 감지 알고리즘 개발)

  • Yoon, Youngmin;Jeong, Yonghwan;Lee, Jongmin;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.11 no.2
    • /
    • pp.11-16
    • /
    • 2019
  • This paper suggests an algorithm for detecting fault of longitudinal controller in autonomous vehicles. Guaranteeing safety in fault situation is essential because electronic devices in vehicle are dependent each other. Several methods like alarm to driver, ceding control to driver, and emergency stop are considered to cope with fault. This research investigates the fault monitoring process in fail-safe system, for controller which is responsible for accelerating and decelerating control in vehicle. Residual is computed using desired acceleration control command and actual acceleration, and detection of its abnormal increase leads to the decision that system has fault. Before computing residual for controller, health monitoring process of acceleration signal is performed using hardware and analytic redundancy. In fault monitoring process for controller, a process model which is fitted using driving data is considered to improve the performance. This algorithm is simulated via MATLAB tool to verify performance.

Fault Detection of Aircraft Turbofan Engine System Using a Fault Detection Filter (고장 검출 필터를 사용한 항공기 터보팬 엔진 시스템의 고장 검출)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.330-336
    • /
    • 2021
  • A typical way to reduce the number of hardware redundancy configurations is to implement them as analytical techniques for detecting, identifying and accepting failures with micro-controller. In this paper, one of the analytical techniques, the fault detection filter, is applied to aircraft turbofan engine system. The fault detection filter is a special type of observer that has the advantage of being able to determine the location of failures by maintaining a constant direction in the output space in the event of a particular failure. We present a single input/output dynamic system modeling of air turbine system in turbofan engine, a fault detection filter design, and simulation results applying it. Simulation results show that fault detection can be effectively applied as a sensitivity effect to the directionality of the detection filter.

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

Performance Analysis of the Anti-Spoofing Array Antenna with Eigenvector Nulling Algorithm

  • Lee, Kihoon;Song, Min Kyu;Lee, Jang Yong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.3
    • /
    • pp.181-189
    • /
    • 2022
  • The public open signals from Global Navigation Satellite System (GNSS) including Global positioning system (GPS) are used widely by many peoples in the world except for the public regulated restriction signals which are encrypted. Nowadays there are growing concerns about GNSS signal spoofing which can deceive the GNSS receivers by abusing these open services. To counter these spoofing threats, many researches have been studied including array antenna techniques which can detect the direction of arrival by means of Multiple Signal Classification (MUSIC) algorithm. Originally the array antenna techniques were developed to countermeasure the jamming signal in electronic warfare by using the nulling or beamforming algorithm toward a certain direction. In this paper, we study the anti-spoofing techniques using array antenna to overcome the jamming and spoofing issues simultaneously. First, we will present the theoretical analysis results of spoofing signal response of Minimum Variance Distortionless Response (MVDR) algorithm in array antenna. Then the eigenvector algorithm of covariance matrix is suggested and verified to work with the existing anti-jamming method. The modeling and simulation are used to verify the effectiveness of the anti-spoofing algorithm. Also, the field test results show that the array antenna system with the proposed algorithms can perform the anti-spoofing function. This anti-spoofing method using array antenna is very effective in the view point of solving both the jamming and spoofing problems using the same array antenna hardware.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF