• Title/Summary/Keyword: portable systems

Search Result 505, Processing Time 0.18 seconds

Development Portable Pipe Spool Location-Confirm System Based UHF RFID (UHF RFID기반 이동형 파이프 스풀 위치 인식 시스템 개발)

  • Kim, Jinsuk;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.329-336
    • /
    • 2014
  • Pipe spool is the most important element of plant equipment in plant construction site. Currently, the plant construction site manage the pipe spool location and usage history by handwriting. Frequently, the pipe spool is moved to unpredictable places by field workers in many construction sites and in cases like this, the pipe stool is replaced with another similar pipe spool. Since it's hard to determine the exact location of some of the pipe spools, it takes unnecessary time and labour to find the missing pipe spools, which proves that stock management is not under control. The purpose of our system is to make the identification of real-time location of the field pipes possible by attaching UHF RFID tags to the pipe spool, which will be used to connect with UHF RFID reader and antenna on vehicles. A field test conducted by the proposed system resulted in the success rate of 98% and the missing 2% was recuperated by hands-on correction, which proved that stock management through the proposed method can be 100% effective. The proposed system is expected to reduce labour costs and make stock control of assets possible, as well as applicable to similar stock management environments.

Design of Optimized ARIA Crypto-Processor Using Composite Field S-Box (합성체 S-Box 기반 최적의 ARIA 암호프로세서 설계)

  • Kang, Min Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.11
    • /
    • pp.271-276
    • /
    • 2019
  • Conventional ARIA algorithm which is used LUT based-S-Box is fast the processing speed. However, the algorithm is hard to applied to small portable devices. This paper proposes the hardware design of optimized ARIA crypto-processor based on the modified composite field S-Box in order to decrease its hardware area. The Key scheduling in ARIA algorithm, both diffusion and substitution layers are repeatedly used in each round function. In this approach, an advanced key scheduling method is also presented of which two functions are merged into only one function for reducing hardware overhead in scheduling process. The designed ARIA crypto-processor is described in Verilog-HDL, and then a logic synthesis is also performed by using Xilinx ISE 14.7 tool with target the Xilnx FPGA XC3S1500 device. In order to verify the function of the crypto-processor, both logic and timing simulation are also performed by using simulator called ModelSim 10.4a.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Application of Rainwater Harvesting System Reliability Model Based on Non-parametric Stochastic Daily Rainfall Generator to Haundae District of Busan (비모수적 추계학적 일 강우 발생기 기반의 빗물이용시설 신뢰도 평가모형의 부산광역시 해운대 신시가지 적용)

  • Choi, ChiHyun;Park, MooJong;Baek, ChunWoo;Kim, SangDan
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.5
    • /
    • pp.634-645
    • /
    • 2011
  • A newly developed rainwater harvesting (RWH) system reliability model is evaluated for roof area of buildings in Haeundae District of Busan. RWH system is used to supply water for toilet flushing, back garden irrigation, and air cooling. This model is portable because it is based on a non-parametric precipitation generation algorithm using a markov chain. Precipitation occurrence is simulated using transition probabilities derived for each day of the year based on the historical probability of wet and dry day state changes. Precipitation amounts are selected from a matrix of historical values within a moving 30 day window that is centered on the target day. Then, the reliability of RWH system is determined for catchment area and tank volume ranges using synthetic precipitation data. As a result, the synthetic rainfall data well reproduced the characteristics of precipitation in Busan. Also the reliabilities of RWH system for each of demands were computed to high values. Furthermore, for study area using the RWH system, reduction efficiencies for rooftop runoff inputs to the sewer system and potable water demand are evaluated for 23%, 53%, respectively.

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.

Performance evaluation study of a commercially available smart patient-controlled analgesia pump with the microbalance method and an infusion analyzer

  • Park, Jinsoo;Jung, Bongsu
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.22 no.2
    • /
    • pp.129-143
    • /
    • 2022
  • Background: Patient-controlled analgesia (PCA) has been widely used as an effective medical treatment for pain and for postoperative analgesia. However, improper dose errors in intravenous (IV) administration of narcotic analgesics from a PCA infusion pump can cause patient harm. Furthermore, opioid overdose is considered one of the highest risk factors for patients receiving pain medications. Therefore, accurate delivery of opioid analgesics is a critical function of PCA infusion pumps. Methods: We designed a microbalance method that consisted of a closed acrylic chamber containing a layer and an oil layer with an electronic balance. A commercially available infusion analyzer (IDA-5, Fluke Co., Everett, WA, USA) was used to measure the accuracy of the infusion flow rate from a commercially available smart PCA infusion pump (PS-1000, UNIMEDICS, Co., Ltd., Seoul, Korea) and compared with the results of the microbalance method. We evaluated the uncertainty of the flow rate measurement using the ISO guide (GUM:1995 part3). The battery life, delay time of the occlusion alarm, and bolus function of the PCA pump were also tested. Results: The microbalance method was good in the short-term 2 h measurement, and IDA-5 was good in the long-term 24 h measurement. The two measurement systems can complement each other in the case of the measurement time. Regarding battery performance, PS-1000 lasted approximately 5 days in a 1 ml/hr flow rate condition without recharging the battery. The occlusion pressure alarm delays of PS-1000 satisfied the conventional alarm threshold of occlusion pressure (300-800 mmHg). Average accuracy bolus volume was measured as 63%, 95%, and 98.5% with 0.1 ml, 1 ml, and 2 ml bolus volume presets, respectively. A 1 ml/hr flow rate measurement was evaluated as 2.08% of expanded uncertainty, with a 95% confidence level. Conclusion: PS-1000 showed a flow accuracy to be within the infusion pump standard, which is ± 5% of flow accuracy. Occlusion alarm of PS-1000 was quickly transmitted, resulting in better safety for patients receiving IV infusion of opioids. PS-1000 is sufficient for a portable smart PCA infusion pump.

A Study on the Possibility of Securing Command of the Air in Local War (지상군의 국지제공권 확보 가능성 연구)

  • Lee, Chang In;Jung, Min Sup;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.173-179
    • /
    • 2022
  • Through the 2014 Donbas conflict and the 2022 Ukraine-Russia war, we are experiencing that the command of the air is no longer only secured by the Air Force. Long-range surveillance reconnaissance and strikes carried out by the Air Force could be replaced by drones and missiles, and the enemy's aerial attacks could be controlled by air defense systems such as Panchir and portable anti-aircraft missiles, allowing ground forces to carry out maneuvers freely. In other words, it is much more advantageous for the air force and the navy to take control of the air through long-distance operations, and the ground forces should support them. Therefore, this study aims to consider the cost-effectiveness aspect of the delivery command of the air; it provides implications for quickly responding to enemy air attacks by developing the air defense weapon system, drones, missiles, precision-guided munitions, etc rather than focusing on expensive fighter jets.

Implementation of ICT-based Underwater Communication Monitoring Device for Underwater Lifting (수중구조를 위한 ICT 기반 수중통신 모니터링 장치 구현)

  • Yoon, Jong-Hwa;Kang, Sang-iL;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.396-400
    • /
    • 2022
  • In this study, an ICT-based underwater communication monitoring device for underwater structures is implemented based on lifting fixture that transport human bodies found on the seabed to sea level. The lifting fixture is packaged with a retback, sideback, and cartridge that injects air. Monitoring systems are developed in a mobile manner in a portable structure. The underwater ultrasonic sensor signal is supplied using a USB port, and the O/S consists of Linux. For the underwater communication dong test, a measurement test was conducted in real time from 6m to 40m in depth on the east coast. The ultrasonic sound sensor is converted to 2,400 bps to verify the transmission error according to the duality. The communication speed of sensor to monitoring is 115,200 bps, and the speed of communication from controller to receiver is 2,400 bps. In the commercialization stage of the lifting device, it is easy to develop a low-end type and the compatibility is wide.

Serial venous lactate measurement following gastrointestinal surgery in horses

  • Smanik, Lauren E.;Moser, Darla K.;Rothers, Kris P.;Hackett, Eileen S.
    • Journal of Veterinary Science
    • /
    • v.23 no.5
    • /
    • pp.66.1-66.8
    • /
    • 2022
  • Background: Prospective clinical study of blood lactate concentration in horses undergoing colic surgery is needed to determine utility in outcome prediction. Objectives: To evaluate venous lactate measurements in horses following colic surgery, including immediately after anesthetic recovery and daily throughout hospitalization, as well as to determine if lactate concentrations were significantly higher in horses that developed postoperative complications or did not survive to hospital discharge. Methods: Horses > 1 year of age undergoing surgery for colic and recovered from general anesthesia were sampled. A portable lactate meter was used to measure venous samples collected immediately following anesthetic recovery and daily throughout hospitalization. Complications arising during hospitalization and survival to hospital discharge were recorded. Results: Fifty one horses were enrolled, ranging in age from 2 to 29 years. Lactate concentration immediately following anesthetic recovery was higher in horses that developed complications during hospitalization (p = 0.046). The odds of developing complications postoperatively were doubled for horses with a venous lactate concentration > 5 mmol/L. Lactate measurements in non-survivors were significantly higher compared to survivors by 96 h postoperatively (p < 0.006). Conclusions: Higher venous lactate concentrations in the postoperative colic period were associated with an increased risk of complications and death. Results suggest horses with higher venous lactate measurements in recovery are more likely to have postoperative complications, with the odds of developing complications doubled for horses with a venous lactate > 5 mmol/L. Evaluation of venous lactate could provide information on prognosis in the postoperative period for horses with surgical colic.

Monitoring System for Optimized Power Management with Indoor Sensor (실내 전력관리 시스템을 위한 환경데이터 인터페이스 설계)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.127-133
    • /
    • 2020
  • As the usages of artificial intelligence is increased, the demand to algorithms for small portable devices increases. Also as the embedded system becomes high-performance, it is possible to implement algorithms for high-speed computation and machine learning as well as operating systems. As the machine learning algorithms process repetitive calculations, it depend on the cloud environment by network connection. For an stand alone system, low power consumption and fast execution by optimized algorithm are required. In this study, for the purpose of smart control, an energy measurement sensor is connected to an embedded system, and a real-time monitoring system is implemented to store measurement information as a database. Continuously measured and stored data is applied to a learning algorithm, which can be utilized for optimal power control, and a system interfacing various sensors required for energy measurement was constructed.