• 제목/요약/키워드: use of digital devices

검색결과 559건 처리시간 0.026초

미래 전파기술 (Future Radio Technology)

  • 김병찬;박상택;강경옥
    • 전자통신동향분석
    • /
    • 제32권6호
    • /
    • pp.66-72
    • /
    • 2017
  • The frequency range of a radio wave is from 3kHz to 300GHz, and radio technologies use this range to improve the quality of human lives. Radio technologies have entered a new phase of communication. The core infrastructure used as the basis for technologies leading the fourth industrial evolution, such as artificial intelligence, the Internet of Things, autonomous cars/drones, augmented reality, robots, and remote medical diagnoses, is the 5G network. The 5G network enables transmitting and receiving large amounts of data at very high speed. In particular, application technologies with artificial intelligence have been studied, including radar, wireless charging, electromagnetic devices and their effects on humans, EMI/EMC, and microwave imaging. In this study, we present a future radio technology that is needed to prepare for the upcoming industrial revolution and digital transformation.

가보 필터를 이용한 이미지 위조 검출 기법 (Image Forgery Detection Using Gabor Filter)

  • ;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.520-522
    • /
    • 2014
  • Due to the availability of easy-to-use and powerful image editing tools, the authentication of digital images cannot be taken for granted and it gives rise to non-intrusive forgery detection problem because all imaging devices do not embed watermark. Forgery detection plays an important role in this case. In this paper, an effective framework for passive-blind method for copy-move image forgery detection is proposed, based on Gabor filter which is robust to illumination, rotation invariant, robust to scale. For the detection, the suspicious image is selected and Gabor wavelet is applied from whole scale space and whole direction space. We will extract the mean and the standard deviation as the texture features and feature vectors. Finally, a distance is calculated between two textures feature vectors to determine the forgery, and the decision will be made based on that result.

Design of an Algorithm for the Validation of SCL in Digital Substations

  • Jang, B.T.;Alidu, A.;Kim, N.D.
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제3권2호
    • /
    • pp.89-97
    • /
    • 2017
  • The substation is a critical node in the power network where power is transformed in the power generation, transmission and distribution system. The IEC 61850 is a global standard which proposes efficient substation automation by defining interoperable communication and data modelling techniques. In order to achieve this level of interoperability and automation, the IEC 61850 (Part 6) defines System Configuration description Language (SCL). The SCL is an XML based file format for defining the abstract model of primary and secondary substation equipment, communications systems and also the relationship between them. It enables the interoperable exchange of data during substation engineering by standardizing the description of applications at different stages of the engineering process. To achieve the seamless interoperability, multi-vendor devices are required to adhere completely to the IEC 61850. This paper proposes an efficient algorithm required for verifying the interoperability of multi-vendor devices by checking the adherence of the SCL file to specifications of the standard. Our proposed SCL validation algorithm consists of schema validation and other functionalities including information model validation using UML data model, the Vendor Defined Extension model validation, the User Defined Rule validation and the IED Engineering Table (IET) consistency validation. It also integrates the standard UCAIUG (Utility Communication Architecture International Users Group) Procedure validation for quality assurance testing. Our proposed algorithm is not only flexible and efficient in terms of ensuring interoperable functionality of tested devices, it is also convenient for use by system integrators and test engineers.

스마트 기기를 활용한 포럼연극 수업이 사회성 향상에 미치는 효과 (The Effects of Forum Theatre Instruction Utilizing Smart Devices on enhancing Social Skills)

  • 김선희
    • 한국융합학회논문지
    • /
    • 제10권11호
    • /
    • pp.275-282
    • /
    • 2019
  • 미래 사회를 살아가야 하는 청소년들에게 사회성은 매우 중요한 역량 중 하나이다. 이 연구는 학생들의 사회성 향상을 위한 대안적 교육방법의 하나로 스마트 기기를 활용한 포럼연극 수업을 제안하고, 이 수업이 사회성 향상에 미치는 효과를 확인하는 것을 목적으로 한다. 연구의 목적을 달성하기 위하여 '디지털 매체 활용 포럼연극 수업설계'를 위한 절차적 모형에 기반하여 수업을 설계 실행한 후 사회적 기술 척도를 활용하여 수업의 효과를 확인하였다. 연구결과, 스마트 기기를 활용한 포럼연극 수업은 총 6차시로 구성('주제 공유하기', '팀빌딩하기, 운영 계획서 작성하기', '문제상황극 시나리오 작성하기', '콘티 작성하기', '문제상황극 상영: 촬영하기', '문제상황극 재상연 및 개입하기') 할 수 있으며, 학생들의 사회적 기술 향상에 긍정적인 영향을 미칠 수 있는 것으로 확인(대응표본 t-test 결과 사회적 기술의 하위 7가지 전 영역에서 모두 유의수준 .05에서 유의미한 차이 발생) 되었다. 참여 학생들의 면담결과를 반영하여 향후 수업의 개선 및 효율적 활용을 위한 필요사항을 제안하였다.

0.18um CMOS 공정을 이용한 강압형 DC-DC 컨버터 보호회로 구현 및 측정 (Implementation and Measurement of Protection Circuits for Step-down DC-DC Converter Using 0.18um CMOS Process)

  • 송원주;송한정
    • 한국산업융합학회 논문집
    • /
    • 제21권6호
    • /
    • pp.265-271
    • /
    • 2018
  • DC-DC buck converter is a critical building block in the power management integrated circuit (PMIC) architecture for the portable devices such as cellular phone, personal digital assistance (PDA) because of its power efficiency over a wide range of conversion ratio. To ensure a safe operation, avoid unexpected damages and enhance the reliability of the converter, fully-integrated protection circuits such as over voltage protection (OVP), under voltage lock out (UVLO), startup, and thermal shutdown (TSD) blocks are designed. In this paper, these three fully-integrated protection circuit blocks are proposed for use in the DC-DC buck converter. The buck converter with proposed protection blocks is operated with a switching frequency of 1 MHz in continuous conduction mode (CCM). In order to verify the proposed scheme, the buck converter has been designed using a 180 nm CMOS technology. The UVLO circuit is designed to track the input voltage and turns on/off the buck converter when the input voltage is higher/lower than 2.6 V, respectively. The OVP circuit blocks the buck converter's operation when the input voltage is over 3.3 V, thereby preventing the destruction of the devices inside the controller IC. The TSD circuit shuts down the converter's operation when the temperature is over $85^{\circ}C$. In order to verify the proposed scheme, these protection circuits were firstly verified through the simulation in SPICE. The proposed protection circuits were then fabricated and the measured results showed a good matching with the simulation results.

본질안전인증 취득을 위한 요구조건 분석에 관한 연구 (A Study on Requirements Analysis for Obtaining Intrinsic Safety Certification)

  • 오규태
    • 전자공학회논문지
    • /
    • 제54권1호
    • /
    • pp.147-151
    • /
    • 2017
  • 원유 탱크나 가스 저장소 등과 같이 상시 폭발 가능한 농도의 지역을 0종 지역이라고 한다. 0종지역에서 각종 장비를 사용하기 위해서는 본질적으로 스파크가 일어나지 않는다는 것을 보증할 수 있는 본질안전인증을 득해야 한다. 본질안전인증을 취득하는 장치는 대부분 간단한 단품 소자이거나 장치가 대부분인데 본 연구에서는 수백가지 부품이 PCB 기판에 실장된 초음파 발생 장치와 마이크로컨트롤러가 포함된 전자전자회로를 본질안전인증을 취득하려고 하는 것이므로 매우 어려운 과정이었다. 본 연구를 통해 까다로운 본질안전인증을 대비한 회로 설계를 어떻게 해야 하는지에 대한 방법을 파악할 수 있게 되었으며 향후 본질안전인증을 취득하게 될 경우 본 연구의 결과를 이용하면 보다 용이하게 본질안전 회로를 설계할 수 있게 될 것이다.

시각장애인의 스마트폰 수용에 관한 연구 (A Study on Smartphone Acceptance for the Visually Impaired)

  • 김은정;박성제;김종원
    • 한국산업정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.79-94
    • /
    • 2016
  • 스마트 폰, 태블릿 PC 등 스마트 디바이스를 통해 언제, 어디서나 인터넷에 접속하여 다양한 정보를 습득할 수 있다. 그러나 장애인의 경우 이러한 IT 환경을 적절히 활용하지 못하고 있으며, 이로 인해 발생하는 정보격차에 대한 사회적 문제가 많은 연구를 통해 지적되고 있다. 본 연구에서는 TAM을 활용하여 시각장애인의 스마트기기 수용의도 및 사용행위에 대한 실증연구를 진행하였다. 그 결과, 혁신성은 지각된 유용성, 지각된 용이성, 지각된 즐거움 모두에 유의미한 것으로 나타났으며, 자아존중감과 자아효능감은 지각된 용이성에만 유의미한 것으로 조사되었다. 또한 지각된 유용성, 지각된 용이성, 지각된 즐거움 모두 재사용의도에 영향을 미치는 것으로 나타났다. 이러한 연구결과는 관련 실무자와 연구자들에게 많은 시사점을 제공할 것이다.

The Use of Virtual Reality in Psychiatry: A Review

  • Kim, Suji;Kim, Eunjoo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • 제31권1호
    • /
    • pp.26-32
    • /
    • 2020
  • With the advancement in modern information technology, virtual reality (VR) is being increasingly used for the diagnosis, assessment, and treatment of mental disorders. Recently, a VR-based cognitive behavioral therapy for social phobia has been recognized as a new medical technology in South Korea. This might lead to an increase in the use of VR in the field of psychiatry. The present review provides an overview of the status of VR therapies in various psychiatric conditions such as anxiety disorder, post-traumatic stress disorder, psychosis, addiction, and eating disorder. Besides, it summarizes the role of VR therapy in the management of disorders associated with child and adolescence psychiatry as well as various other clinical applications. Additionally, we discuss the merits and limitations of VR therapy, which might serve as a useful reference for researchers. In the current environment wherein novel medical models consisting of a combination of digital devices and medicine are being developed; understanding new technologies such as VR could open new doors to mental health treatments.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • 제48권3호
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • 제13권2호
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.