• Title/Summary/Keyword: 기능카드

Search Result 418, Processing Time 0.03 seconds

Implementation of the Smombie (smartphone zombie) VR experience game using Google Cardboard and Bluetooth controller (구글 카드보드와 블루투스 컨트롤러를 이용한 스몸비(스마트폰 좀비) VR 체험 게임)

  • Kim, Ji-hyun;Seo, Mi-hye;Yang, Seon-young;Lee, Bo-hyun;Jin, I-seul;Park, Su e;Park, Jung-kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.212-215
    • /
    • 2017
  • In this paper, VR game was produced to inform the danger of using smartphone while walking and to raise awareness. In this VR games, you can experience Smombie (smart phone and zombie compound word) like a real situation by using Google card board and Bluetooth controller. Designed as a directions game of everyday material, the user indirectly experiences the dangerous situations that may actually occur in everyday life. In the virtual space, you can see the map on the smartphone, navigate the route, and send text messages using the controller during the game. We will explain how to implement smartphone map and send text message using controller which are the main functions of VR game.

  • PDF

SoC Implementation of Fingerprint Feature Extraction System with Ridge Following (융선추적을 이용한 지문 특징점 추출기의 SoC 구현)

  • 김기철;박덕수;정용화;반성범
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.97-107
    • /
    • 2004
  • This paper presents an System-on-Chip(SoC) implementation of fingerprint feature extraction system. Typical fingerprint feature extraction systems employ binarization and thinning processes which cause many extraction errors for low qualify fingerprint images and degrade the accuracy of the entire fingerprint recognition system. To solve these problems, an algorithm directly following ridgelines without the binarization and thinning process has been proposed. However, the computational requirement of the algorithm makes it hard to implement it on SoCs by using software only. This paper presents an implementation of the ridge-following algorithm onto SoCs. The algorithm has been modified to increase the efficiency of hardwares. Each function block of the algorithm has been implemented in hardware or in software by considering its computational complexity, cost and utilization of the hardware, and efficiency of the entire system. The fingerprint feature extraction system has been developed as an IP for SoCs, hence it can be used on many kinds of SoCs for smart cards.

Design of Industrial Communication Gateway Using Additive Layer Type Communication Module (적층형 통신 모듈을 이용한 산업용 통신 게이트웨이 설계)

  • Nam, Jae-Hyun;Eum, Sang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1673-1678
    • /
    • 2019
  • There are various networks and communication methods are used in industrial communication. Enterprises need to convert communications between industrial devices and networks for production line expansion, factory upgrades, network segmentation, and SI. This requires designers manufactured by many manufacturers to provide communication equipment for data or protocol conversion in order to connect and transmit various other mechanical devices to the network. This paper designed industrial communication gateway that can support the transformation of industrial communication protocol using multi-layered communication module. Industrial communication gateways have a structure that connects individual communication modules using RS485 communication to multiple layers. Each communication module consisted of analog and digital data card, LAN, and CAN-enabled card. The main board processor used Atmega micro-processor, and the RS485 slot was placed to have a multi-layer communication module structure. These additive layer type communication modules support analog and digital I/O functions and LAN and CAN for wide use in industrial communication control and monitoring.

A Study of Activity Participation Level and Functional Disability for The Elderly Aged Over 65 years (65세 이상 노인의 참여활동수준과 기능장애에 관한 연구)

  • Park, Kyoung-Young;Shin, Su-Jung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.9
    • /
    • pp.222-228
    • /
    • 2020
  • The purpose of this study was to investigate activity participation level and functional disability based on ICF for the elderly aged over 65 years. Subjects were 100 senior citizens. We performed data collection using Korean Activity Card Sorting(KACS) and World Health Organization Disability Assessment Schedule 2.0(WHODAS 2.0). Data were analyzed using descriptive statistics, Pearson's correlation, multiple regression. As a result of the survey of activity participation levels, retained level of activity participation of instrumental activity was highest at 75.06%. Among the WHODAS 2.0 sub-domain, 'getting along with people', 'participation in society' had the most difficulties and 'self-care', 'life activities' were the lowest. An analysis of the correlation between the activity retention rate and functional disability showed that there was a significant negative correlation. Significant factors influencing functional disability were activity participation level of social activity, instrumental activity and main work(retirement). We confirmed that activity participation level was important factor on functional disability. Further, we need standardization study for generalization.

A New R-IPC Protocol for a High-speed Router System to Improve the System Performance (고속 대용량 라우터의 성능 향상을 위한 R-IPC프로토콜 성능분석)

  • 김수동;조경록
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1096-1101
    • /
    • 2004
  • By a tremendous expansion of Internet users, there's a number effects that cause the phenomenon of bottlenecked switching packets from routers. In order to tear down this problem, distributed system is applicable to almost every highly performed router systems. The main processor of distributed system, which manages routing table, commands IPC to delivering the forwarding table line processor that eases functionalities of the router. This makes the system having wired-speed forwarding function based on the hardware so that the performance of the network can be enhanced. Therefore, IPC, which assign a part of router, is necessary to exchange data smoothly and the constitution of IPC using Ethernet is widely adapted as a method for saving investment. In this paper, R-IPC mechanism improve the packet-processing rate over 10% through changed from defect of conventional Ethernet IPC, that is, 2 layer processing to TCP/IP or UDP/ IP into 1 layer processing for efficient packet forwarding.

Performance Test of Paylad Data Receiving Equipment for STSAT-2 (과학기술위성 2호 탑재체데이터 수신시스템의 성능 시험)

  • Lee, Jong-Ju;Seo, In-Ho;Lee, Chol;Oh, Chi-Wook;Kim, Kyung-Hee;Park, Sung-Ok
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.4
    • /
    • pp.347-352
    • /
    • 2007
  • This paper describes the design and implementation of PFM(Proto Flight Model, PFM) of DRE(Data Receiving Equipment, DRE) for Science and Technology Satellite 2(STSAT-2) and the results of integration performance test. DRE components are X-band receiver, DCE(Data Combine Equipment, DCE) and RAC(Receiving and Archiving Computer, RAC). DCE consists of I&Q data combiner and ECL signal distributor. RAC consists of DRC(Data Receiving Card) and ST2RAS(STSAT-2 Receiving and Archinving Software). X-band receiver receives 10Mbps QPSK I, Q satellite data and sends the data to DCE. DRC stores the I&Q combine data from DCE to RAID. The pre-processing program sorts and stores to satellite status data and payload data. The performance of DRE in the functional and space environments test satisfies the requirements of STSAT-2.

The Design of Hybrid Cryptosystem for Smart Card (스마트카드용 Hybrid 암호시스템 설계)

  • Song, Je-Ho;Lee, Woo-Choun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2322-2326
    • /
    • 2011
  • General cryptosystem uses differently the data and key value for the increment of security level, processes the repetition of limited number and increases the periodic feature of LFSR similar infinite series. So, it cause the efficiency of the cryptosystem. In this thesis, proposed algorithm is composed of reformat, permutation, data cipher block and key scheduler which is applied the new function by mixed symmetric cryptography and asymmetric cryptography. We design the cryptosystem of smart card using the common Synopsys and simulate by ALTERA MAX+PLUS II at 40MHz. Consequently, we confirm the 52% increment of processing rate and the security level of 16 rounds.

Design and Implementation of the System Provide of the Loyalty Service for Electronic Commerce (전자상거래 로열티 서비스를 위한 시스템 제공자 설계 및 구현)

  • Hong, Jae-Young;Kim, Ki-Young;Lee, Young-Seok;Choi, Hoon;Kim, Young-Kuk;Hong, Seung-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.348-355
    • /
    • 2000
  • Loyalty is a bonus point that a customer earns in reward of purchasing goods of a shop or a manufacturer. The management of loyalty such as issuing, accounting, reimbursing is carried out by the loyalty system. Traditional loyalty systems were proprietary. As a result, the systems are not interoperable with each other. However, our loyalty system allows a group of merchants join together and use the same IC card to operate their own loyalty programs. Data and counters can be shared or totally isolated, using secret codes and keys. The loyalty pool system communicates with the loyalty service providers over the Internet and performs the management of loyalty in fully automated manner. This paper describes the functional architecture and internal behavior of the loyalty pool system along with the communication protocols.

  • PDF

A study for USIM Forensic Tools (USIM 포렌식 툴에 관한 연구)

  • Lim, Jae-Yoon;Yun, Seung-Hwan;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.71-76
    • /
    • 2007
  • 정보 통신기술의 발전으로 단말기와 네트워크에 독립적인 부가서비스를 이용할 수 있는 개방형 가입자인증 카드인 USIM(Universal Subscriber Identification Module) 카드가 이용되고 있다. 모바일 정보기기의 성능 향상으로 다양한 기능이 추가되고 USIM에 저장된 개인정보의 중요성이 부각되어 범죄 도구로 이용될 가능성이 높아 졌으며 법정 증거자료로서의 중요성도 증가되었다. 모바일 포렌식은 기존의 데이터 저장장치와는 다른 파일시스템을 가지고 있기 때문에 거기에 맞는 전용 포렌식 툴들이 필요하며, USIM과 관련된 범죄가 일어날 때, 자료의 복구와 빠른 검사를 통해 법적 증거화 시킬 수 있는 USIM 포렌식 틀을 요구한다. 본 논문에서는 USIM의 기본적인 구조와 파일시스템을 분석하고 USIM 포렌식 관점에서 증거화 시킬 수 있는 다양한 유형과 절차들을 알아보고, 현재 사용 중인 USIM 포렌식 툴들에 대해 비교 분석한다.

  • PDF

A secure token-updated authentication scheme using security key (비밀키를 이용한 토큰 업데이트 보안 인증 기법)

  • Liang, Jun;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2007
  • Recently, a large number of authentication schemes based on smart cards have been proposed, using the thinking of OTP (one-time password) to withstand replay attack. Unfortunately, if these schemes implement on PCs instead of smart cards, most of themcannot withstand impersonation attack and Stolen-Verifier attack since the data on PCs is easy to read and steal. In this paper, a secure authentication scheme based on a security key and a renewable token is proposed to implement on PCs. A comparison with other schemes demonstrates the proposed scheme has following merits: (1) Withstanding Stolen-Verifier attack (2) Withstanding Impersonation attack (3) Providing mutual authentication; (4) Easy to construct secure session keys.

  • PDF