• Title/Summary/Keyword: One-Time Signature

검색결과 98건 처리시간 0.026초

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • 제2권4호
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

Emission Characteristics of HFC-23 (CHF3)/HCFC-22 (CHClF2) between Different Air Masses in Northeastern Asia (동북아시아 지역에서의 공기괴별 HFC-23/HCFC-22의 배출특성)

  • Li, Shanlan;Kim, Joo-Il;Kim, Kyung-Ryul;Muhle, Jens
    • Journal of Korean Society for Atmospheric Environment
    • /
    • 제26권5호
    • /
    • pp.490-498
    • /
    • 2010
  • HCFC-22 (chlorodifluoromethane, $CHClF_2$), one of the major components in various refrigeration, is emitted mostly from developing countries, as its consumption is not limited until 2013 by the Montreal Protocol. In addition, HFC-23 (trifluoromethane, $CHF_3$), a by-product in the manufacture of HCFC-22, is also a powerful greenhouse gas. Here, we discuss the regional emission characteristics of these compounds based on high-frequency in-situ measurements using the "Medusa" GC-MS system. HCFC-22 and HFC-23 baseline concentrations measured at Gosan (Jeju Island, Korea) from November 2007 to December 2008 increased by 1.8 ppt/yr and 0.6 ppt/yr, respectively. Pollution events of these compounds were observed, very frequently (e.g., ~2~3 times) at Gosan than baseline levels. All the measurement data were divided into four groups by simultaneously considering the ratio (HFC-23/HCFC-22) and concentration (HCFC-22) at Trinidad Head (TH, California, USA). The residence time of trajectories were then analyzed in each of the four groups. The results exhibited the existence of a strong correlation with air mass origin for each group: 1) Air masses originating from Siberia in the north and from the Pacific in the south had ratios of 0.08~0.12 and concentrations of 196.9~254.3 ppt which is highly comparable to background air at TH. 2) Air masses passing over the Southern China exhibited similar ratios but higher HCFC-22 concentrations. 3) Air masses passing over the Northern China had ratios of 0.12~0.21. 4) Air masses passing over Korea and/or Japan had ratios of 0.01~0.08. Our results suggest that the HFC-23/HCFC-22 ratio can be used as a good indicator for the assessment of the pollution with Chinese origin. We also confirmed differences in air masses traveling over Northern and Southern China, most likely due to differences in air mass travelling speed over these regions before arriving at Gosan. This signature may be treated as one of the critical components in identifying the emission sources from different parts of China.

The design of communication protocol for controlling efficiently modular medical instruments (모듈화된 의료장비들의 효율적 제어를 위한 통신 프로토콜 설계)

  • 신창민;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2000년도 추계종합학술대회
    • /
    • pp.284-287
    • /
    • 2000
  • Recently, developing medical devices have a tendency becoming the module for satisfying user's mutual complex needs. Because the most effective method for the observation of patients condition a diagnosis and a treatment is collecting data from various devices and controling operation following it. Module tendency is more popular due to manage easily totally many individual systems. This study implemented communication protocol to control by one control system connecting modular medical devices. Implemented system consist of one master module controlling all module and managing communication and many Slave modules. Communication between each modules introduced SPI(Serial Peripheral Interface) among many synchronous serial communication methods for the exact transmission and receipt of data. All communication executes by packet format. This can detect error. And, this protocol introduced PNP(Plug And Play) function that auto-detect connecting or removing module during running. This protocol exactly transmitted and received in faster speed more than 1Mbps. And in practical application to the ventilator this confirmed to give and take real-time data. And various functions by th central control system is implemented in this protocol.

  • PDF

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권12호
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Object Detection Method on Vision Robot using Sensor Fusion (센서 융합을 이용한 이동 로봇의 물체 검출 방법)

  • Kim, Sang-Hoon
    • The KIPS Transactions:PartB
    • /
    • 제14B권4호
    • /
    • pp.249-254
    • /
    • 2007
  • A mobile robot with various types of sensors and wireless camera is introduced. We show this mobile robot can detect objects well by combining the results of active sensors and image processing algorithm. First, to detect objects, active sensors such as infrared rays sensors and supersonic waves sensors are employed together and calculates the distance in real time between the object and the robot using sensor's output. The difference between the measured value and calculated value is less than 5%. We focus on how to detect a object region well using image processing algorithm because it gives robots the ability of working for human. This paper suggests effective visual detecting system for moving objects with specified color and motion information. The proposed method includes the object extraction and definition process which uses color transformation and AWUPC computation to decide the existence of moving object. Shape information and signature algorithm are used to segment the objects from background regardless of shape changes. We add weighing values to each results from sensors and the camera. Final results are combined to only one value which represents the probability of an object in the limited distance. Sensor fusion technique improves the detection rate at least 7% higher than the technique using individual sensor.

A Study on the dance movements of Go-sung Five-Clown Leper Drum Dance - Focusing on the variation over time - (고성오광대 문둥북춤 춤사위 연구 - 시대적 변화를 중심으로 -)

  • Heo, Chang-Yeol
    • (The) Research of the performance art and culture
    • /
    • 제37호
    • /
    • pp.5-31
    • /
    • 2018
  • The mask dance drama Goseong Ogwangdae's first act, Mundung Bukchum. The story is about a man who was born to the upper class but contracted leprosy, an incurable disease, due to his ancestors' accumulated sin. Although he is suffering, he is able to triumph over the disease through sinmyeong (catharsis) that is expressed through the wordless act of Mundung Bukchum. This thesis focuses on Goseong Ogwangdae's Mundung Bukchum, particularly the meaning, costume, accompanying music, and process of pedagogical transmission. The chronological characteristics of Goseong Ogwangdae's Mundung Bukchum are as follows. First, as time goes on, the number of dance motions in Mundung Bukchum has increased and the motions used have become reified. Second, I address the small barrel drum used in Mundung Bukchum and check how, through the drum, the changed expression of Mundung is shown.In a 1965 video introduced Mundung is grasping the drum and stick and the dance appears to be made up only of humorous motions. Also in a 1969 video, "Mundung Gwangdae," from the start Mundung is grasping the drum and stick. In 1988 in a video we can see the same scene as today, with the drum and stick sitting in the center of the stage at the start of the dance. We can also confirm that the same fourteen dance motions used today are present. Third, we can also confirm the changes in Goseong Ogwangdae's signature motion, baegimsae as time goes on. Observing the video from 1965, baegimsae does not appear in Mundung Bukchum. In 2000 we can clearly see the baegimsae performed once to the left and to the right while Mundung is squatting. Comparing 1969 to 1988, there is no symmetry in the motions, baegimsae is not done to both left and right, but only in one direction. Watching the record from 2000, the baegimsae motion is performed just as it is now, with the body thrown forward with a sharp push off the ground. Fourth I confirmed how the music used to accompany Goseong Ogwangdae's Mundung Bukchum has changed over time. In 1965 according to records of Mundung Bukchum's appearance, the dance was accompanied by the taryeong rhythmic pattern played on the usual four percussion instruments (barrel drum, hourglass drum, large gong, small gong). In the 1969 records of Mundung Bukchum the accompanying music is gutgeori rhythmic pattern performed on the usual four percussion instruments-an obvious difference. In 1988 the music with Mundung Bukchum is gutgeori rhythmic pattern transitioning into jajinmori rhythmic pattern. In 2000 the music with Mundung Bukchum includes the percussion instruments as well as taepyeongso (double reed oboe) playing gutgeori and jajinmori rhythmic patterns.

Delineating Transcription Factor Networks Governing Virulence of a Global Human Meningitis Fungal Pathogen, Cryptococcus neoformans

  • Jung, Kwang-Woo;Yang, Dong-Hoon;Maeng, Shinae;Lee, Kyung-Tae;So, Yee-Seul;Hong, Joohyeon;Choi, Jaeyoung;Byun, Hyo-Jeong;Kim, Hyelim;Bang, Soohyun;Song, Min-Hee;Lee, Jang-Won;Kim, Min Su;Kim, Seo-Young;Ji, Je-Hyun;Park, Goun;Kwon, Hyojeong;Cha, Sooyeon;Meyers, Gena Lee;Wang, Li Li;Jang, Jooyoung;Janbon, Guilhem;Adedoyin, Gloria;Kim, Taeyup;Averette, Anna K.;Heitman, Joseph;Cheong, Eunji;Lee, Yong-Hwan;Lee, Yin-Won;Bahn, Yong-Sun
    • 한국균학회소식:학술대회논문집
    • /
    • 한국균학회 2015년도 춘계학술대회 및 임시총회
    • /
    • pp.59-59
    • /
    • 2015
  • Cryptococcus neoformans causes life-threatening meningoencephalitis in humans, but the treatment of cryptococcosis remains challenging. To develop novel therapeutic targets and approaches, signaling cascades controlling pathogenicity of C. neoformans have been extensively studied but the underlying biological regulatory circuits remain elusive, particularly due to the presence of an evolutionarily divergent set of transcription factors (TFs) in this basidiomycetous fungus. In this study, we constructed a high-quality of 322 signature-tagged gene deletion strains for 155 putative TF genes, which were previously predicted using the DNA-binding domain TF database (http://www.transcriptionfactor.org/). We tested in vivo and in vitro phenotypic traits under 32 distinct growth conditions using 322 TF gene deletion strains. At least one phenotypic trait was exhibited by 145 out of 155 TF mutants (93%) and approximately 85% of the TFs (132/155) have been functionally characterized for the first time in this study. Through high-coverage phenome analysis, we discovered myriad novel TFs that play critical roles in growth, differentiation, virulence-factor (melanin, capsule, and urease) formation, stress responses, antifungal drug resistance, and virulence. Large-scale virulence and infectivity assays in insect (Galleria mellonella) and mouse host models identified 34 novel TFs that are critical for pathogenicity. The genotypic and phenotypic data for each TF are available in the C. neoformans TF phenome database (http://tf.cryptococcus.org). In conclusion, our phenome-based functional analysis of the C. neoformans TF mutant library provides key insights into transcriptional networks of basidiomycetous fungi and ubiquitous human fungal pathogens.

  • PDF

A study of poverty experiences among Korean elderly women in the United States (재미 한인 여성노인의 빈곤경험에 관한 연구)

  • Yeom, Jihye
    • 한국노년학
    • /
    • 제40권4호
    • /
    • pp.801-821
    • /
    • 2020
  • There are a number of prior studies on the poverty experience of Korean women, but little is known about the poverty experience of Korean elderly women in the U.S. The purpose of this study is to examine the poverty experiences of Korean elderly women who immigrated to the U. S. Qualitative case study methods were used to achieve these research objectives. Three Korean elderly women living in Oakland of California who received Supplemental Security Income (SSI) from the U.S. federal government were included in the study. The data were collected by conducting a total of six meetings per participant, and the researcher read the consent form directly to the participants and obtained a hand-written signature. The analysis and interpretation began by repeating the interview transcript several times, and the repeated keywords were to be understood in the context, focusing on time, space, and relationships with other people. The contextual understanding of Korean elderly women's experiences in poverty was interpreted in three dimensions: extending poverty in their mother country, double torture as female immigrants, and limiting labor due to aging and diseases. Before moving to the U.S., they had a difficult livelihood by farming and one of them had to live in poverty due to the bereavement to her husband. But even after moving to the U.S., they have continued to live in poverty. As female immigrants with low education and no special skills, they were incorporated into the periphery of the labor market in the industrialized U.S. and were forced to make a living with low wages. Korean elderly women were unable to return to the labor market in the surrounding areas due to aging and diseases, and were continuing their impoverished lives relying on SSI. From the findings, we discussed the role of the Korean immigrants community as a way to improve the quality of life for Korean elderly women in the U.S.