• Title/Summary/Keyword: Embedded device

Search Result 889, Processing Time 0.029 seconds

Design and Implementation of a Location-Based Push-Service Platform (위치기반 푸쉬서비스 플랫폼 설계 및 구현)

  • Shim, Jae-Min;Lee, Eung-Jae;Ju, Yang-Wan;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.47-55
    • /
    • 2009
  • As the wireless internet technology such as mobile phone, WIBRO, HSDPA develops, customized location-based services for traffic, tourism, shopping, and emergency relief has lately attracted attention. For giving customized services. we should consider dynamic characteristics of moving object which continuously change their location. In this paper, we define the context trigger type of moving object and design triggering method for processing context generated by moving object. Also we propose location-based push service platform including context trigger of moving object for supporting location-based information to user. The proposed system gathers moving object stream from the terminal based on MS-assisted or Stand-alone positioning mode of embedded GPS in terminal extract user context by user device agent, and send context information to server.

  • PDF

Development of Optimum Construction Lift Operation System using Sensing Information for High-rise Building (센싱정보를 활용한 초고층 건설용 리프트 최적화 운행 시스템 개발)

  • Shin, Joong-Hwan;Kwon, Soon-Wook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.5
    • /
    • pp.153-163
    • /
    • 2013
  • As recent buildings have been more higher and larger, construction vertical lifting planning and operation is a key factor for successful project in tall building. Although many studies have been trying to set up a construction lifting planning system at early stage, there's not existing a control real-time lift operation control system with respect to during construction stage. Therefore, In this study, we use the sensor device to collect the lift operating data for improvement of lift operation efficiency and develope optimum lift operating system which can perform real-time analysis. Finally, we verify the efficiency of proposed system through comparison between realtime operating data and simulated data using proposing system. In this paper, the proposed system show more efficient moving line compared with previous system. This can contribute to development of unmanned lift system.

Improving Flash Translation Layer for Hybrid Flash-Disk Storage through Sequential Pattern Mining based 2-Level Prefetching Technique (하이브리드 플래시-디스크 저장장치용 Flash Translation Layer의 성능 개선을 위한 순차패턴 마이닝 기반 2단계 프리패칭 기법)

  • Chang, Jae-Young;Yoon, Un-Keum;Kim, Han-Joon
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.101-121
    • /
    • 2010
  • This paper presents an intelligent prefetching technique that significantly improves performance of hybrid fash-disk storage, a combination of flash memory and hard disk. Since flash memory embedded in a hybrid device is much faster than hard disk in terms of I/O operations, it can be utilized as a 'cache' space to improve system performance. The basic strategy for prefetching is to utilize sequential pattern mining, with which we can extract the access patterns of objects from historical access sequences. We use two techniques for enhancing the performance of hybrid storage with prefetching. One of them is to modify a FAST algorithm for mapping the flash memory. The other is to extend the unit of prefetching to a block level as well as a file level for effectively utilizing flash memory space. For evaluating the proposed technique, we perform the experiments using the synthetic data and real UCC data, and prove the usability of our technique.

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

Risk Management and Telecommunications Research for customers of the accident location (사고선박의 고객위치파악용 위험관리 통신연구)

  • Kwak, Eun-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.331-335
    • /
    • 2016
  • When a boating accident, such as a January number three, the customer's risk management issues emerged. Ships and accident risk in confined spaces such as risk management to locate the customer and dangers of probation is available. In this paper, aboard after consent to obtain information for customers to wrist to customers, webbing or portable device embedded in devices and Wireless sensor information Input was attached, disposable consumer information. Customer on board the ship setting for location analysis and positioning according to information communication protocol, ships, each customer's real-time location information on the screen, 3 the foundation of d customers on the floor Can be designed to inform. Threshold designed to reduce the error of the information to analyze the position in current position and errors. Also, to system attacks would control the situation of accident and emergency jaenanguk server with real-time information transmission of information outside the emergency during a disaster, search and Disaster relief to be possible.

  • PDF

A Study on Development of Wearable Technology Based Biker Suits Part.1 (이륜차운전자를 위한 웨어러블 테크놀로지 의류 개발에 관한 연구 제1보)

  • Lee, Hyun-Seung;Lee, Jae-Jung
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.8
    • /
    • pp.57-72
    • /
    • 2011
  • The purpose of this research is to develop a safe and convenient wearable technology wear for bikers. For this, we studied the current usage of two-wheeled vehicles and have also researched the rate of accidents and its causes. We then used them along with previous studies in terms of visual perception as factors to decide the crucial elements of the riders' apparel. Case studies and the break down for the established prototypes for bikers were practiced as well. Based on this process, a survey was conducted to find out the needs of the bikers in the areas of both apparel and technology and then proceeded to produce the appropriate design and device modules. In the apparel sector, the result of the survey indicated that it was considerable that any digital devices were not shown to sustain a natural visible look. It also was essential that the materials were durable and made for safety and easy movement. In the digital function sector, it was significant that a motion input interface which will be embedded into the wear was needed to avoid any dangerous situations. This would ensure the safety of not only the rider but the surrounding riders as well. Lastly, protecting the rider's skin from any harmful elements was regarded necessary as well. Based on these requirements, a new prototype was created and will be tested if the requirements stated above are all met and will be evaluated according to the effectiveness of its functions.

Forward Error Correction based Adaptive data frame format for Optical camera communication

  • Nguyen, Quoc Huy;Kim, Hyung-O;Lee, Minwoo;Cho, Juphil;Lee, Seonhee
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.94-102
    • /
    • 2015
  • Optical camera communication (OCC) is an extension of Visible Light Communication. Different from traditional visible light communication, optical camera communications is an almost no additional cost technology by taking the advantage of build-in camera in devices. It was became a candidate for communication protocol for IoT. Camera module can be easy attached to IoT device, because it is small and flexible. Furthermore almost smartphone equip one or two camera for both back and font side with high quality and resolution. It can be utilized for receiving the data from LED or positioning. Actually, OCC combines illumination and communication. It can supply communication for special areas or environment where do not allow Radio frequency such as hospital, airplane etc. There are many concept and experiment be proposed. In this paper we proposed utilizing Android smart-phone camera for receiver and introduce new approach in modulation scheme for LED at transmitter. It also show how Manchester coding can be used encode bits while at the same time being successfully decoded by Android smart-phone camera. We introduce new data frame format for easy decoded and can be achieve high bit rate. This format can be easy to adapt to performance limit of Android operator or embedded system.

Heterogeneous Device Packaging Technology for the Internet of Things Applications (IoT 적용을 위한 다종 소자 전자패키징 기술)

  • Kim, Sarah Eunkyung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.23 no.3
    • /
    • pp.1-6
    • /
    • 2016
  • The Internet of Things (IoT) is a new technology paradigm demanding one packaged system of various semiconductor and MEMS devices. Therefore, the development of electronic packaging technology with very high connectivity is essential for successful IoT applications. This paper discusses both fan-out wafer level packaging (FOWLP) and 3D stacking technologies to achieve the integrattion of heterogeneous devices for IoT. FOWLP has great advantages of high I/O density, high integration, and design flexibility, but ultra-fine pitch redistribution layer (RDL) and molding processes still remain as main challenges to resolve. 3D stacking is an emerging technology solving conventional packaging limits such as size, performance, cost, and scalability. Among various 3D stacking sequences wafer level via after bonding method will provide the highest connectivity with low cost. In addition substrates with ultra-thin thickness, ultra-fine pitch line/space, and low cost are required to improve system performance. The key substrate technologies are embedded trace, passive, and active substrates or ultra-thin coreless substrates.

A Study on Efficient Design of PUF-Based RFID Authentication Protocol (PUF 기반 RFID 인증 프로토콜의 효율적 설계에 관한 연구)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.987-999
    • /
    • 2014
  • A PUF is embedded and implemented into a tag or a device, and outputs a noise y with an input of x, based on its own unique physical characteristics. Although x is used multiple times as inputs of PUF, the PUF outputs slightly different noises, ($y_1,{\cdots}y_n$), and also the PUF has tamper-resistance property, hence it has been widely used in cryptographic protocol. In this paper, we study how to design a PUF-based RFID authentication protocol in a secure and an efficient way. Compared with recent schemes, the proposed scheme guarantees both authentication and privacy of backword/forward under the compromise of long-term secrets stored in tag. And also, the most cost and time-consumming procedure, key recovery algorithm used with PUF, has been desgined in the side of RFID reader, not in the tag, and, consequently, gives possibility to minimize costs for implementation and running time.

Side-Channel Analysis Based on Input Collisions in Modular Multiplications and its Countermeasure (모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책)

  • Choi, Yongje;Choi, Dooho;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1091-1102
    • /
    • 2014
  • The power analysis attack is a cryptanalytic technique to retrieve an user's secret key using the side-channel power leakage occurred during the execution of cryptographic algorithm embedded on a physical device. Especially, many power analysis attacks have targeted on an exponentiation algorithm which is composed of hundreds of squarings and multiplications and adopted in public key cryptosystem such as RSA. Recently, a new correlation power attack, which is tried when two modular multiplications have a same input, is proposed in order to recover secret key. In this paper, after reviewing the principle of side-channel attack based on input collisions in modular multiplications, we analyze the vulnerability of some exponentiation algorithms having regularity property. Furthermore, we present an improved exponentiation countermeasure to resist against the input collision-based CPA(Correlation Power Analysis) attack and existing side channel attacks and compare its security with other countermeasures.