• Title/Summary/Keyword: use of digital devices

Search Result 560, Processing Time 0.034 seconds

Future Radio Technology (미래 전파기술)

  • Kim, B.C.;Park, S.T.;Kang, K.O.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.66-72
    • /
    • 2017
  • The frequency range of a radio wave is from 3kHz to 300GHz, and radio technologies use this range to improve the quality of human lives. Radio technologies have entered a new phase of communication. The core infrastructure used as the basis for technologies leading the fourth industrial evolution, such as artificial intelligence, the Internet of Things, autonomous cars/drones, augmented reality, robots, and remote medical diagnoses, is the 5G network. The 5G network enables transmitting and receiving large amounts of data at very high speed. In particular, application technologies with artificial intelligence have been studied, including radar, wireless charging, electromagnetic devices and their effects on humans, EMI/EMC, and microwave imaging. In this study, we present a future radio technology that is needed to prepare for the upcoming industrial revolution and digital transformation.

Image Forgery Detection Using Gabor Filter (가보 필터를 이용한 이미지 위조 검출 기법)

  • NININAHAZWE, Sheilha;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.520-522
    • /
    • 2014
  • Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. Forgery detection plays an important role in this case. In this paper, an effective framework for passive-blind method for copy-move image forgery detection is proposed, based on Gabor filter which is robust to illumination, rotation invariant, robust to scale. For the detection, the suspicious image is selected and Gabor wavelet is applied from whole scale space and whole direction space. We will extract the mean and the standard deviation as the texture features and feature vectors. Finally, a distance is calculated between two textures feature vectors to determine the forgery, and the decision will be made based on that result.

Design of an Algorithm for the Validation of SCL in Digital Substations

  • Jang, B.T.;Alidu, A.;Kim, N.D.
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.89-97
    • /
    • 2017
  • The substation is a critical node in the power network where power is transformed in the power generation, transmission and distribution system. The IEC 61850 is a global standard which proposes efficient substation automation by defining interoperable communication and data modelling techniques. In order to achieve this level of interoperability and automation, the IEC 61850 (Part 6) defines System Configuration description Language (SCL). The SCL is an XML based file format for defining the abstract model of primary and secondary substation equipment, communications systems and also the relationship between them. It enables the interoperable exchange of data during substation engineering by standardizing the description of applications at different stages of the engineering process. To achieve the seamless interoperability, multi-vendor devices are required to adhere completely to the IEC 61850. This paper proposes an efficient algorithm required for verifying the interoperability of multi-vendor devices by checking the adherence of the SCL file to specifications of the standard. Our proposed SCL validation algorithm consists of schema validation and other functionalities including information model validation using UML data model, the Vendor Defined Extension model validation, the User Defined Rule validation and the IED Engineering Table (IET) consistency validation. It also integrates the standard UCAIUG (Utility Communication Architecture International Users Group) Procedure validation for quality assurance testing. Our proposed algorithm is not only flexible and efficient in terms of ensuring interoperable functionality of tested devices, it is also convenient for use by system integrators and test engineers.

The Effects of Forum Theatre Instruction Utilizing Smart Devices on enhancing Social Skills (스마트 기기를 활용한 포럼연극 수업이 사회성 향상에 미치는 효과)

  • Kim, Sun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.275-282
    • /
    • 2019
  • Social Skills are one of the most important competency for student who live in the future Society. The purpose of this study is to propose a Forum Theatre Instruction utilizing smart devices as an alternative teaching and learning methods for enhancing the social skills of students, and to examine the effect of this instruction on the improvement of it. In order to achieve the purpose, the class was designed based on the 'Procedural Instructional Model for FTI using Digital Media', and the effectiveness of it was verified using 'SSIS'. FTI can be composed of six classes, and results of paired t-test showed that it was effective in enhancing students' social skills. Reflecting the interview results of the participant, the further requirements for improvement and efficient use of FTI were suggested.

Implementation and Measurement of Protection Circuits for Step-down DC-DC Converter Using 0.18um CMOS Process (0.18um CMOS 공정을 이용한 강압형 DC-DC 컨버터 보호회로 구현 및 측정)

  • Song, Won-Ju;Song, Han-Jung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.21 no.6
    • /
    • pp.265-271
    • /
    • 2018
  • DC-DC buck converter is a critical building block in the power management integrated circuit (PMIC) architecture for the portable devices such as cellular phone, personal digital assistance (PDA) because of its power efficiency over a wide range of conversion ratio. To ensure a safe operation, avoid unexpected damages and enhance the reliability of the converter, fully-integrated protection circuits such as over voltage protection (OVP), under voltage lock out (UVLO), startup, and thermal shutdown (TSD) blocks are designed. In this paper, these three fully-integrated protection circuit blocks are proposed for use in the DC-DC buck converter. The buck converter with proposed protection blocks is operated with a switching frequency of 1 MHz in continuous conduction mode (CCM). In order to verify the proposed scheme, the buck converter has been designed using a 180 nm CMOS technology. The UVLO circuit is designed to track the input voltage and turns on/off the buck converter when the input voltage is higher/lower than 2.6 V, respectively. The OVP circuit blocks the buck converter's operation when the input voltage is over 3.3 V, thereby preventing the destruction of the devices inside the controller IC. The TSD circuit shuts down the converter's operation when the temperature is over $85^{\circ}C$. In order to verify the proposed scheme, these protection circuits were firstly verified through the simulation in SPICE. The proposed protection circuits were then fabricated and the measured results showed a good matching with the simulation results.

A Study on Requirements Analysis for Obtaining Intrinsic Safety Certification (본질안전인증 취득을 위한 요구조건 분석에 관한 연구)

  • Oh, Kyutae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.147-151
    • /
    • 2017
  • Areas of concentrations that can be exploited at all times, such as gas reservoirs in crude oil tanks, are called zero zones. In order to use various equipment in Zone 0, an intrinsically safe certification must be obtained that can guarantee that sparks will not occur in nature. Most devices that acquire intrinsic safety certification are mostly simple single-component devices or devices. In this study, it was a very difficult process because we intend to acquire the intrinsic safety certification of an electronic circuit including an ultrasonic generator and a microcontroller in which hundreds of components are mounted on a PCB substrate. Through this study, we have been able to understand how to design a circuit for intricate intrinsic safety certification. and Using the results of this study, it will be easier to design intrinsically safe circuits when trying to develop a circuit that can obtain intrinsic safety certification.

A Study on Smartphone Acceptance for the Visually Impaired (시각장애인의 스마트폰 수용에 관한 연구)

  • Kim, Eun Jung;Park, Seong Je;Kim, Jong Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.4
    • /
    • pp.79-94
    • /
    • 2016
  • Anytime, anywhere, we can be connected through the Internet and obtain information by using the smart device. However, people with disabilities are unable to take advantage of smart IT environment. Many studies pointed out that this has been the cause of the digital divide and social problems. In this study, we conducted an empirical study on the use of smart devices to help the blind acceptance of conduct. According to the study results, innovativeness had the impact on perceived usefulness, perceived ease of use, perceived enjoyment, and self-esteem and self-efficacy appeared to affect the perceived ease of use. In addition, the perceived usefulness, perceived ease of use, perceived enjoyment affected the intention to re-use. These study results contribute to both theory and practice.

The Use of Virtual Reality in Psychiatry: A Review

  • Kim, Suji;Kim, Eunjoo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.31 no.1
    • /
    • pp.26-32
    • /
    • 2020
  • With the advancement in modern information technology, virtual reality (VR) is being increasingly used for the diagnosis, assessment, and treatment of mental disorders. Recently, a VR-based cognitive behavioral therapy for social phobia has been recognized as a new medical technology in South Korea. This might lead to an increase in the use of VR in the field of psychiatry. The present review provides an overview of the status of VR therapies in various psychiatric conditions such as anxiety disorder, post-traumatic stress disorder, psychosis, addiction, and eating disorder. Besides, it summarizes the role of VR therapy in the management of disorders associated with child and adolescence psychiatry as well as various other clinical applications. Additionally, we discuss the merits and limitations of VR therapy, which might serve as a useful reference for researchers. In the current environment wherein novel medical models consisting of a combination of digital devices and medicine are being developed; understanding new technologies such as VR could open new doors to mental health treatments.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.