• Title/Summary/Keyword: Embedded data

Search Result 2,141, Processing Time 0.026 seconds

Design Methodology of Communication & Control Device for Smart Grid Power Facility based on DSP and Raspberry Pi (DSP와 라즈베리 파이를 기반으로 한 스마트 그리드 전력설비의 통신제어장치 설계 방법론)

  • Oh, Se-Young;Lee, Jun-Hyeok;Lee, Sae-In;Park, Chang-Su;Ko, Yun-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.835-844
    • /
    • 2021
  • In this paper, a power facility communication control device was designed to autonomously determine and separate the fault section through communication between power facilities in the smart grid distribution system. In the power facility communication control device, the control module was designed as a DSP to measure three-phase voltage and current, and the communication module was designed as an embedded-based Raspberry Pi to determine the fault section and realize the fault section separation through communication between power facilities. Communication between DSP and Raspberry Pi was designed by SPI communication, and communication between Raspberry Pi was designed based on Wi-Fi. Finally, a performance evaluation system based on three power facility communication control devices was built, and simulation verification was conducted for various fault events that may occur on the distribution line. As a result of the test evaluation, it was possible to confirm the effectiveness of the design methodology of the communication control device by showing the required response of the communication control device to all test cases.

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.

Privacy-Enhanced Subject Identification method Embedded in X.509 Certificate (X.509 인증서에 포함된 프라이버시 보호기능을 가진 개인 식별 방법)

  • Lee, Jae-Il;Park, Jong-Wook;Kim, Seung-Joo;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.59-66
    • /
    • 2006
  • A Certification Authority issues X.509 public key certificates to bind a public key to a subject. The subject is specified through one or more subject names in the 'subject' or 'subjectAltName' fields of a certificate. In reality, however, there are individuals that have the same or similar names. This ambiguity can be resolved by including a 'permanent identifier' in all certificates issued to the same subject, which is unique across multiple CAs. But, a person's unique identifier is regarded as a sensitive personal data. Such an identifier cannot simply be included as part of the subject field, since its disclosure may lead to misuse. We present a new method for secure and accurate user authentication through the PEPSI included in the standard certificate extension of a X.509 certificate. The PEPSI can be served not only for user authentication but also for the user anonymity without divulging personal information.

Multidrop Ethernet based IoT Architecture Design for VLBI System Control and Monitor (VLBI 시스템 제어 및 모니터를 위한 멀티드롭 이더넷 기반 IoT 아키텍처 설계)

  • Song, Min-Gyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1159-1168
    • /
    • 2020
  • In the past, control and monitor of a large number of instruments is a specialized area, which requires an expensive dedicated module to implement. However, with the recent development of embedded technology, various products capable of performing M&C (Monitor and Control) have been released, and the scope of application is expanding. Accordingly, it is possible to more easily build a small M&C environment than before. In this paper, we discussed a method to replace the M&C of the VLBI system, which had to be implemented through a specialized hardware product, with an inexpensive general imbeded technology. Memory based data transmission, reception and storage is a technology that is already generalized not only in VLBI but also in the network field, and more effective M&C can be implemented when some items of Ethernet are optimized for the VLBI (Very Long Baseline Interferometer) system environment. In this paper, we discuss in depth the design and implementation for the multidrop based IoT architecture.

A Study on Autonomous Stair-climbing System Using Landing Gear for Stair-climbing Robot (계단 승강 로봇의 계단 승강 시 랜딩기어를 활용한 자율 승강 기법에 관한 연구)

  • Hwang, Hyun-Chang;Lee, Won-Young;Ha, Jong-Hee;Lee, Eung-Hyuck
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.362-370
    • /
    • 2021
  • In this paper, we propose the Autonomous Stair-climbing system based on data from ToF sensors and IMU in developing stair-climbing robots to passive wheelchair users. Autonomous stair-climbing system are controlled by separating the timing of landing gear operation by location and utilizing state machines. To prove the theory, we construct and experiment with standard model stairs. Through an experiment to get the Attack angle, the average error of operating landing gear was 2.19% and the average error of the Attack angle was 2.78%, and the step division and status transition of the autonomous stair-climbing system were verified. As a result, the performance of the proposed techniques will reduce constraints of transportation handicapped.

Implementation of Rule-based Smartphone Motion Detection Systems

  • Lee, Eon-Ju;Ryou, Seung-Hui;Lee, So-Yun;Jeon, Sung-Yoon;Park, Eun-Hwa;Hwang, Jung-Ha;Choi, Doo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.45-55
    • /
    • 2021
  • Information obtained through various sensors embedded in a smartphone can be used to identify and analyze user's movements and situations. In this paper, we propose two rule-based motion detection systems that can detect three alphabet motions, 'I', 'S', and 'Z' by analyzing data obtained by the acceleration and gyroscope sensors in a smartphone. First of all, the characteristics of acceleration and angular velocity for each motion are analyzed. Based on the analysis, two rule-based systems are proposed and implemented as an android application and it is used to verify the detection performance for each motion. Two rule-based systems show high recognition rate over 90% for each motion and the rule-based system using ensemble shows better performance than another one.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Insulation Effect of Double Layered Bubble Sheet Application in Cold Weather Concrete and Initial Quality Control by Wireless Sensor Network (한중시공에서 2중 버블시트 포설에 따른 단열 효과분석 및 무선센서 네트워크에 의한 초기 품질관리)

  • Han, Min-Cheol;Seo, Hang-Goo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.1
    • /
    • pp.21-29
    • /
    • 2021
  • The objective of this study is to evaluate the effect of the application of double layered bubble sheet on the curing of slab and wall concrete placed at the job site in cold weather and to offer a feasibility of Concrete IoT Management System(CIMS), which is wireless sensor network developed by the authors, to manage early age quality of the concrete in terms of temperature, maturity and strength development. Test results indicated that the application of bubble sheet enhances the insulation performance, which results in an increase of the temperature by around 1~20. 6℃. It is found that CIMS can gather the temperature, maturity and strength development data from the sensors embedded from 30 m far from CIMS successfully. Predicted compressive strengths by CIMS had good agreement with measured ones within 2 MPa error level until 7 days. It is thought that the combination of the bubble sheet application for cold weather protection and CIMS for quality management tool in cold weather concreting contributes to shorten the time for the form removal by one day.

Vehicle ECU Design Incorporating LIN/CAN Vehicle Interface with Kalman Filter Function (LIN/CAN 차량용 인터페이스와 칼만 필터 기능을 통합한 차량용 ECU 설계)

  • Jeong, Seonwoo;Kim, Yongbin;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.762-765
    • /
    • 2021
  • In this paper, an automotive ECU (electronic control unit) with Kalman filter accelerator is designed and implemented. RISC-V is exploited as a processor core. Accelerator for Kalman filter matrix operation, CAN (controller area network) controller for in-vehicle network, and LIN (local interconnect network) controller are designed and embedded. Kalman filter operation consists of time update process and measurement update process. Current state variable and its error covariance are estimated in time update process. Final values are corrected from input measurement data and Kalman gain in measurement update process. Usually floating-point multiplication is exploited in software implementation, but fixed-point multiplier considering accuracy analysis is exploited in this paper to reduce hardware area. In 28nm silicon fabrication, its operating frequency, area, and gate counts are 100MHz, 0.37mm2, and 760k gates, respectively.

Multi-channel analyzer based on a novel pulse fitting analysis method

  • Wang, Qingshan;Zhang, Xiongjie;Meng, Xiangting;Wang, Bao;Wang, Dongyang;Zhou, Pengfei;Wang, Renbo;Tang, Bin
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2023-2030
    • /
    • 2022
  • A novel pulse fitting analysis (PFA) method is presented for the acquisition of nuclear spectra. The charging process of the feedback capacitor in the resistive feedback charge-sensitive preamplifier is equivalent to the impulsive pulse, and its impulse response function (IRF) can be obtained by non-linear fitting of the falling edge of the nuclear pulse. The integral of the IRF excluding the baseline represents the energy deposition of the particles in the detector. In addition, since the non-linear fitting process in PFA method is difficult to achieve in the conventional architecture of spectroscopy system, a new multi-channel analyzer (MCA) based on Zynq SoC is proposed, which transmits all the data of nuclear pulses from the programmable logic (PL) to the processing system (PS) by high-speed AXI-Stream in order to implement PFA method with precision. The linearity of new MCA has been tested. The spectrum of 137Cs was obtained using LaBr3(Ce) scintillator detector, and was compared with commercial MCA by ORTEC. The results of tests indicate that the MCA based on PFA method has the same performance as the commercial MCA based on pulse height analysis (PHA) method and excellent linearity for γ-rays with different energies, which infers that PFA method is an effective and promising method for the acquisition of spectra. Furthermore, it provides a new solution for nuclear pulse processing algorithms involving regression and iterative processes.