• Title/Summary/Keyword: Information devices

Search Result 8,980, Processing Time 0.04 seconds

A Study on countermeasure for privacy in mobile office (모바일 오피스 개인정보 보호 방안에 대한 연구)

  • Park, Yongjoon;Lee, Yunjung
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

Photoluminescence Characterization of Vertically Coupled Low Density InGaAs Quantum Dots for the application to Quantum Information Processing Devices

  • Ha, S.-K.;Song, J.D.
    • Applied Science and Convergence Technology
    • /
    • v.24 no.6
    • /
    • pp.245-249
    • /
    • 2015
  • Vertically coupled low density InGaAs quantum dots (QDs) buried in GaAs matrix were grown with migration enhanced molecular beam epitaxy method as a candidate for quantum information processing devices. We performed excitation power-dependent photoluminescence measurements at cryogenic temperature to analyze the effects of vertical coupling according to the variation in thickness of spacer layer. The more intense coupling effects were observed with the thinner spacer layer, which modified emission properties of QDs significantly. The low surface density of QDs was observed by atomic force microscopy, and scanning transmission electron microscopy verified the successful vertical coupling between low density QDs.

WiBEEM Addressing Scheme Based on NAA Algorithm for High-Speed Mobility of USN Devices

  • Jeon, Ho-In
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.42-46
    • /
    • 2007
  • In this paper, we proposed an efficient short address allocation mechanism for WiBEEM devices using NAA(Next Address Available) algorithm. The proposed addressing mechanism is based upon the NAA information that is delivered over the beacons every time it is transmitted at the beginning of each super-frame. The NAA-based addressing mechanism is not a systematic way of allocating short addresses to newly joining devices and thus tree-routing cannot be supported. However, it has great advantages when U-City core services including U-Parking Lot System or ATIS(Advanced Traveler Information System) services that require high-speed mobility are considered. Moreover, the proposed addressing mechanism can provide significant expandability of the wireless network to various applications and fast device discovery.

  • PDF

The Stopped Vehicle Detection in the Tunnel Incident Surveillance System (터널 영상 유고 감지 시스템에서 정차 검출 알고리즘)

  • Kim, Gyu-Yeung;Lee, Geun-Hoo;Kim, Hyun-Tae;Kim, Jae-Ho;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.607-608
    • /
    • 2011
  • In this paper, we propose stopped vehicle detection algorithm in the tunnel. It is shown that our method distinguished objects from background estimated image, and then detected stopped vehicles efficiently based on the experimental analysis about the color information of their lamps. The simulation results show the detection rate is achieved over 95% in the tunnel image.

  • PDF

The Framework for Authentication and Authorization for Constrained M2M Devices

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.482-484
    • /
    • 2015
  • M2M technology enables us to "Things" and collect various kinds of information from "Things". M2M is defined as a technology that enables electronic and mechanical devices to communicate with each other seamlessly and perform actions without human intervention. In this paper, we review some security solutions for M2M devices and show our light weight framework which is responsible for security of constrained M2M devices. In addition to the above-mentioned ones, we propose the framework can be applied for constrained environment and give conclusion and future works.

Next-Generation Biomedical Devices via MicroLEDs (마이크로LED를 응용한 차세대 생체 치료 소자 개발)

  • Lee, Han Eol
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.34 no.4
    • /
    • pp.221-228
    • /
    • 2021
  • With the advent of the IoT (internet of things) era, there has been discussion on how to efficiently use various information from daily life. In academic and industrial society, various smart devices such as smart watches, smart phones, and smart glasses have been developed and commercialized for narrowing the physical/psychological distance with user information. According to recent developments of smart devices, the contemporary people have desired to check their body information and treat disease by themselves. According to the needs of the time, biological researches by phototherapy/monitoring have been actively conducted. Among various light sources, microLEDs have been spotlighted due to their superior optoelectric properties and stability. In this paper, we would like to review the state-of-the research results on the next-generation biological therapy devices via microLEDs.

Design of Image Generation System for DCGAN-Based Kids' Book Text

  • Cho, Jaehyeon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1437-1446
    • /
    • 2020
  • For the last few years, smart devices have begun to occupy an essential place in the life of children, by allowing them to access a variety of language activities and books. Various studies are being conducted on using smart devices for education. Our study extracts images and texts from kids' book with smart devices and matches the extracted images and texts to create new images that are not represented in these books. The proposed system will enable the use of smart devices as educational media for children. A deep convolutional generative adversarial network (DCGAN) is used for generating a new image. Three steps are involved in training DCGAN. Firstly, images with 11 titles and 1,164 images on ImageNet are learned. Secondly, Tesseract, an optical character recognition engine, is used to extract images and text from kids' book and classify the text using a morpheme analyzer. Thirdly, the classified word class is matched with the latent vector of the image. The learned DCGAN creates an image associated with the text.

An Identification System Using QR Codes for Production and Disposal Information of Internet of Things Devices (QR코드 기반 사물인터넷 디바이스의 생산/폐기 정보 식별체계)

  • Lim, Jae-Hyun;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.664-665
    • /
    • 2016
  • This paper proposes an identification system based on QR (Quick Response) code for production and disposal information of Internet of Things (IoT) devices. Three thousands and five hundreds of electronic devices have replaced and discarded in South Korea in a year, and twenty millions to fifty millions tons of e-wastes have happened throughout the world every year. According to Gartner, market research institution, the number of IoT devices will increase from 2.3 billions in 2013 to 30 billions in 2020, however, the regulations and systems which take into account environment were not prepared. The identification systems for reflecting information of devices, which are produced or discarded, are required to resolve the problem. The proposed identification system based on QR code can store much more massive data such as the producer, product's model, serial number, recycling rate, recovering rate, recyclability rate, recoverability rate than RFID (Radio-Frequency Identification). Also, users can immediately recognize production and disposal information by a QR code application in a smartphone.

  • PDF

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

A Way to Smart Interface based on the IEEE 1451 Standards for Five-senses Information Device in Ubiquitous Environments (유비쿼터스 환경에서 오감 정보 장치를 위한 IEEE 1451 표준 기반의 스마트 인터페이스 방안)

  • Kim, Dong-Jin;Kim, Jeong-Do;Ham, Yu-Kyung;Lee, Jung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.339-346
    • /
    • 2008
  • Ubiquitous computer can be interfaced with many several peripheral devices for information acquisition. Users should be able to easily use these devices without considering when these devices were interfaced, how to use these devices, and interoperability issues (such as plug and play, the installation of device drivers, and so on). Further, computers and their users need an interface technology that provides five-senses information (the recognition and expressions of the user) such that multimodal interaction can be enabled. In this paper, we proposed an IEEE 1451 standard that uses a smart interface standard for interfacing devices with ubiquitous computer. IEEE 1451 describes the property information of a transducer in the transducer electronic data sheet (TEDS). Further, by using the TEDS format, the interoperability between devices can be enabled by means of the plug-and-play function; it also makes the inconvenient installations of device drivers unnecessary.