• Title/Summary/Keyword: device access

Search Result 965, Processing Time 0.03 seconds

Suggestions on the Direction of Acupuncture Point Research through the SPARC Program and the TARA Project (SPARC 프로그램과 TARA 프로젝트를 통한 향후 경혈 활용 연구 방향 제언)

  • Sunmi Choi
    • Korean Journal of Acupuncture
    • /
    • v.41 no.3
    • /
    • pp.59-67
    • /
    • 2024
  • Objectives : By reviewing NIH's SPARC program and NCCIH's TARA project, we would like to suggest the direction of research on acupoint utilization in Korea. Methods : The goals, operation methods, result linkage strategies, collaborative activities, and research contents of the SPARC program and TARA program were reviewed and summarized. Results : SPARC connects the identification of medical device mechanisms, clinical efficacy, regulatory approval, and industrialization through nerve stimulation, and the research results are provided to researchers and companies as an open access database. The TARA program creates an open access database of anatomy, physiology, and pathology information on acupuncture points and links it with SPARC to increase understanding and utilization of acupuncture points in the development of medical devices and conducts international cooperation with Korea, China, Japan, etc. Korea's acupuncture point utilization research lacks medical device industrialization connectivity and international cooperation planning. Conclusions : Korea's research on the use of acupuncture points should be planned and managed so that it can be linked to medical device industrialization. In addition, it is necessary to anticipate the demand for bioelectronic medical devices and conduct joint research through open access database linkage and international cooperation.

Android Storage Access Control for Personal Information Security (개인정보를 위한 안드로이드 저장장치 접근제어)

  • You, Jae-Man;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.123-129
    • /
    • 2013
  • Android file system is vulnerable to the external access of system resources via its arbitrary access mode and need user's control for SD and UMS medias due to its open architecture. In response to the device control, there is a drawback that its controlability is valid only in the case of embedded linux kernel with VDC function. Hence the solution is to directly implement VDC through system call, with another security module for device storage than system module being added to android system. In this paper the new method of android storage access control for personal information is proposed via VDC for mount system of storage. The access method for SD and UMS were implemented using VDC and mount mechanism. This access control system has been designed to control the granted users in kernel level if files are flowed out by copying. As a result, it was proved through testing that the access control system has exactly detected the write access operation.

Development of Eco-Friendly Ag Embedded Peroxo Titanium Complex Solution Based Thin Film and Electrical Behaviors of Res is tive Random Access Memory

  • Won Jin Kim;Jinho Lee;Ryun Na Kim;Donghee Lee;Woo-Byoung Kim
    • Korean Journal of Materials Research
    • /
    • v.34 no.3
    • /
    • pp.152-162
    • /
    • 2024
  • In this study, we introduce a novel TiN/Ag embedded TiO2/FTO resistive random-access memory (RRAM) device. This distinctive device was fabricated using an environmentally sustainable, solution-based thin film manufacturing process. Utilizing the peroxo titanium complex (PTC) method, we successfully incorporated Ag precursors into the device architecture, markedly enhancing its performance. This innovative approach effectively mitigates the random filament formation typically observed in RRAM devices, and leverages the seed effect to guide filament growth. As a result, the device demonstrates switching behavior at substantially reduced voltage and current levels, heralding a new era of low-power RRAM operation. The changes occurring within the insulator depending on Ag contents were confirmed by X-ray photoelectron spectroscopy (XPS) analysis. Additionally, we confirmed the correlation between Ag and oxygen vacancies (Vo). The current-voltage (I-V) curves obtained suggest that as the Ag content increases there is a change in the operating mechanism, from the space charge limited conduction (SCLC) model to ionic conduction mechanism. We propose a new filament model based on changes in filament configuration and the change in conduction mechanisms. Further, we propose a novel filament model that encapsulates this shift in conduction behavior. This model illustrates how introducing Ag alters the filament configuration within the device, leading to a more efficient and controlled resistive switching process.

An Indoor Positioning Method using IEEE 802.11 Channel State Information

  • Escudero, Giovanni;Hwang, Jun Gyu;Park, Joon Goo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1286-1291
    • /
    • 2017
  • In this paper, we propose an indoor positioning system that makes use of the attenuation model for IEEE 802.11 Channel State Information (CSI) in order to determine its distance from an Access Point (AP) at a fixed position. With the use of CSI, we can mitigate the problems present in the use of Received Signal Strength Indicator (RSSI) data and increase the accuracy of the estimated mobile device's location. For the experiments we performed, we made use of the Intel 5300 Series Network Interface Card (NIC) in order to receive the channel frequency response. The Intel 5300 NIC differs from its counterparts in that it can obtain not only the RSSI but also the CSI between an access point and a mobile device. We can obtain the signal strengths and phases from subcarriers of a system which in turn means making use of this data in the estimation of a mobile device's position.

Token-Based User Dynamic Access Control for Secure Device Commands in Smart Home (스마트 홈에서 안전한 디바이스 제어 명령을 위한 토큰 기반 사용자 동적 접근제어 기법)

  • Hyeseon Yu;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.553-568
    • /
    • 2024
  • Due to the rapid development of IoT technology and the increase in home activities after the COVID-19 pandemic, users' demand for smart homes has increased significantly. As the size of the smart home market increases every year and the number of users increases, the importance of personal information protection and various security issues is also growing. It often grants temporary users smart home owner rights and gives them access to the system. However, this can easily allow access to third parties because the authorities granted are not properly managed. In addition, it is necessary to prevent the possibility of secondary damage using personal information collected through smart home devices and sensors. Therefore, in this paper, to prevent indiscriminate access to smart home systems without reducing user convenience, access rights are subdivided and designed according to the functions and types of smart home devices, and a token-based user access control technique using personal devices is proposed.

Implementation of Voice Awareness Security Sytems (음성인식 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.799-800
    • /
    • 2006
  • This thesis implemented security systems of voice awareness which is higher accessible than existing security system using biological authentication system and is inexpensive in module of security device, and has an advantage in usability. Proposed the security systems of voice awareness implemented algorithm for characteristic extraction of inputted speaker's voice signal verification, and also implemented database of access control that is founded on extractible output. And a security system of voice awareness has a function of an authority of access control to system.

  • PDF

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Design and Implementation of LonWorks/IP Router for Network-based Control (네트워크 기반 제어를 위한 LonWorks/IP 라우터의 설계 및 구현)

  • Hyun, Jin-Wook;Choi, Gi-Sang;Choi, Gi-Heung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.4 s.316
    • /
    • pp.79-88
    • /
    • 2007
  • Demand for the technology for access to device control network in industry and for access to building automation system via internet is on the increase. In such technology integration of a device control network with a data network such as internet and organizing wide-ranging DCS(distributed control system) is needed, and it can be realized in the framework of VDN(virtual device network)[1,2]. Specifications for device control network and data network are quite different because of the differences in application. So a router that translates the communication protocol between device control network and data network and efficiently transmits information to destination is needed for implementation of the VDN, This paper proposes the concept of NCS(networked control system) based on VDN(virtual device network) and suggests the routing algorithm that uses embedded system.[3]

Implementation of External Memory Expansion Device for Large Image Processing (대규모 영상처리를 위한 외장 메모리 확장장치의 구현)

  • Choi, Yongseok;Lee, Hyejin
    • Journal of Broadcast Engineering
    • /
    • v.23 no.5
    • /
    • pp.606-613
    • /
    • 2018
  • This study is concerned with implementing an external memory expansion device for large-scale image processing. It consists of an external memory adapter card with a PCI(Peripheral Component Interconnect) Express Gen3 x8 interface mounted on a graphics workstation for image processing and an external memory board with external DDR(Dual Data Rate) memory. The connection between the memory adapter card and the external memory board is made through the optical interface. In order to access the external memory, both Programmable I/O and DMA(Direct Memory Access) methods can be used to efficiently transmit and receive image data. We implemented the result of this study using the boards equipped with Altera Stratix V FPGA(Field Programmable Gate Array) and 40G optical transceiver and the test result shows 1.6GB/s bandwidth performance.. It can handle one channel of 4K UHD(Ultra High Density) image. We will continue our study in the future for showing bandwidth of 3GB/s or more.

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.