• Title/Summary/Keyword: mobility of memory

Search Result 78, Processing Time 0.022 seconds

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

A Study on the Edu-tainer Convergence App for Young Children's Play learning in Mobile Environments (모바일 환경에서의 유아 놀이 학습을 위한 에듀테이너 융합 앱 연구)

  • Jung, Doo-Yong;Sok, Yun-Young
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.23-28
    • /
    • 2016
  • In this paper, smart devices using a 4 to 6 years old, infants and parents to a user layer of training and with games or studying infants by integrating them. Not losing interest and concentration, Mobile infants to learning to learn Korean, English, the estimated budget. design the app tainer. For parents of infants and a variety of media concentration and learning Korean, English, English word cards that can increase the interest of the design and, to find a picture Memory game, had provided games are various kinds such as learning to do puzzles. Also, infants and tries to help study a visual learning and auditory learning at the same time can be achieved by mothers of children is much more conveniently. Learning to guide implementation to maximize the availability, convenience and mobility.

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

Optimization of image data for Mobile Game Gontents (모바일게임 콘텐츠 개발을 위한 이미지 데이터 최적화)

  • Lee, Hwan-joong;Kim, young-bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.38-42
    • /
    • 2008
  • In the 2000s, the PC package game market has withered, but the internet based on-line game, the wireless internet based mobile game and high-powered console game market have been main stream. Among those markets, mobile game market has rapidly increased because it has 'mobility' that overcomes the limitation of time and area. But, unlike other platforms, mobile game user have to pay the higher price for download mobile game contents through the wireless internet and mobile game developer have to overcome the limitation of storage memory capacity.of mobile phone. Chiefly, the image data consume the storage capacity of mobile game contents, this paper present a technology to optimize image data for mobile game contents through analyzing type of compression method and image formats.

  • PDF

Coexistence of Everything that Exists -An Imagination about Love of Korean American Immigrant Nakchung THUN (존재하는 모든 것들의 공존 -미주 이민자 전낙청의 사랑에 관한 한 상상)

  • Chon, Woo-Hyung
    • Journal of Popular Narrative
    • /
    • v.26 no.2
    • /
    • pp.191-219
    • /
    • 2020
  • This paper aims to identify the key features of the novel writing of Korean American immigrants and their meaning as one aspect of movement and contact occuring in the early modern period. The late return of the novels written by Nakcheong THUN in the 1930s is significant in that it restored ideas on the diversity of early modern mobility and confronted the history and culture of immigrants who were excluded from records and memories. Not only are these novels a product of the phenomenon of immigration, but they have also created a crack in the dichotomous perceptions of domination and subordination, center and periphery by envisioning it as a space that creates new history, culture, institutions and values. These novels treat the free love of intellectual, emotional, and ethical figures as a central event, demystifying Western free love, and at the same time, a society divided by various identities including class, race, and gender. The novels by Nakchung THUN visualize the active exchange between the immigrant and the indigenous community through the character of Jack, and imagines the heterotopia as a place where not for the immigrants' utopia, but for everyone's coexists. These novels have declared a kind of memory war on the subordinate and marginalized contact zones. The contact zones of the immigration area had been a place for experiencing extreme conflicts and discords, and at the same time, it has served as a place where various groups and communities are connected. The contact zones were common areas of solidarity and creation before being subject to division and occupation. The contact zones are far from the border or borderlands, so it is not a fixed and immutable deadlock. As a world free from central domination the contact zones have been a space that preoccupied history and culture through various encounters, and have been a community.

Fabrication and Evaluation of NMOS Devices (NMOS 소자의 제작 및 평가)

  • 이종덕
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.16 no.4
    • /
    • pp.36-46
    • /
    • 1979
  • Using N_ Ch silicon gate technology . the capacitors and transistors with various dimenssion were fabricated. Although the applied process was somewhat standard the conditions of ion implantation for the gate were varied by changing the implant energies from 30keV to 60keV for B and from 100 keV to 175keV for P . The doses of the implant also changed from 3 $\times$ 10 /$\textrm{cm}^2$ to 5 $\times$ 10 /$\textrm{cm}^2$ for B and from 4$\times$ 10 /$\textrm{cm}^2$ to 7 $\times$ 10 /$\textrm{cm}^2$ for P . The D. C. parameters such as threshold voltage. substrate doping level, the degree of inversion, capacitance. flat band voltage, depletion layer width, gate oxide thickless, surface states, motile charge density, electron mobility. leakage current were evaluated and also compared with the corresponing theoretical values and / or good numbers for application. The threshold voltages measured using curve tracer and C-V plot gave good agreements with the values calculated from SUPREM II which has been developed by Stanford University process group. The threshold vol tapes with back gate bias were used to calculate the change of the substrate doping level. The measured subthreshold slope enabled the prediction of the degree of inversion The D. C. testing results suggest the realized capacitors and transistors are suited for the memory applications.

  • PDF

Acceleration of Viewport Extraction for Multi-Object Tracking Results in 360-degree Video (360도 영상에서 다중 객체 추적 결과에 대한 뷰포트 추출 가속화)

  • Heesu Park;Seok Ho Baek;Seokwon Lee;Myeong-jin Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.306-313
    • /
    • 2023
  • Realistic and graphics-based virtual reality content is based on 360-degree videos, and viewport extraction through the viewer's intention or automatic recommendation function is essential. This paper designs a viewport extraction system based on multiple object tracking in 360-degree videos and proposes a parallel computing structure necessary for multiple viewport extraction. The viewport extraction process in 360-degree videos is parallelized by composing pixel-wise threads, through 3D spherical surface coordinate transformation from ERP coordinates and 2D coordinate transformation of 3D spherical surface coordinates within the viewport. The proposed structure evaluated the computation time for up to 30 viewport extraction processes in aerial 360-degree video sequences and confirmed up to 5240 times acceleration compared to the CPU-based computation time proportional to the number of viewports. When using high-speed I/O or memory buffers that can reduce ERP frame I/O time, viewport extraction time can be further accelerated by 7.82 times. The proposed parallelized viewport extraction structure can be applied to simultaneous multi-access services for 360-degree videos or virtual reality contents and video summarization services for individual users.