• Title/Summary/Keyword: 마이크로컴퓨터

Search Result 696, Processing Time 0.025 seconds

An Intelligent Decision Support System for Retinal Disease Diagnosis based on SVM using a Smartphone (스마트폰을 이용한 SVM 기반 망막 질병 진단을 위한 지능적인 의사 결정 지원 시스템)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Tifani, Yusrina
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.373-383
    • /
    • 2015
  • This paper proposes a decision support system to recognizing retinal diseases. This paper uses a smartphone platform and cloud computing as the base of the system. A microscopic lens is attached int' the smartphone camera to capture the user retinal image for recognizing the user's retinal condition. An application is assembled in computer and then installed in to the smartphone. The application role is to connect between the system in smartphone and system in cloud, the application will send the retinal image to the cloud system to be classified. The paper uses OCFE (optimized classifier based on feature elimination) algorithm as the classifier. The retinal image is trained using combination of two ophthalmology databases DIARETDB1 v2.1 and STARE. Therefore, this system average accuracy is 88%, while the average error rate is 12%.

Design and Implementation of Private Folder Management Systems for the Security of User Data on Multi-user Environments (다중 사용자 환경에서 개인 데이터 보안을 위한 개인 폴더 관리 시스템의 설계 및 구현)

  • Park, Yong-Hun;Park, Hyeong-Soon;Kim, Hak-Chul;Lee, Hyo-Joon;Jang, Yong-Jin;Lim, Jong-Tae;Jang, Su-Min;Seo, Won-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.52-61
    • /
    • 2010
  • In recent, the interests of multi-user systems have been increased. Multi-user systems allow a number of users to access the system simultaneously. Security is one of the key issues to be addressed in a multi-user environment. We propose a solution based on the NTFS file system that provides the personal data security and considers the convenience of users. The system increases the convenience of users by simplifying the complexity of the security setting on NTFS. We also propose a variety of policies that prevent from the conflicts incurring when different users set up the personal folders simultaneously and do not set up the important folders such as the window system folders as personal folders. In addition, our system supports the function of setting up the prohibition folder lists so that no one can not set the folder to their personal folders.

Design and Implementation of Sensor Node Hardware Platform Based on Sensor Network Environment (무선 센서네트워크 환경 기반의 센서노드 하드웨어 플랫폼 설계 및 구현)

  • Kwak, Yoon-Sik;Choi, Jong-Nam;Mun, Cheol;Jung, Chang-Kyoo;Park, Dong-Hee;Song, Seok-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.227-232
    • /
    • 2010
  • According to the development of ubiquitous and computer techniques, the application fields of sensor network have been enlarged. We present the design and implementation of sensor node which is the most important component of sensor network techniques in this paper. The proposed sensor node is implemented with 8-bit microprocessor, and temperature and humidity sensing device to gather temperature and humidity data in real world. It achieves low production cost and user convenience, and also has the feature os existing commercial sensor node. Though our experiments, we show that deviation of temperature and humidity are $5^{\circ}C$ and 23.2% respectively, and the proposed sensor node is reliable in real applications.

Using Arduino and Processing Graphics performance validation (아두이노와 Processing을 사용한 그래픽 성능 검증)

  • Choi, Chul-kil;Lee, Sung-jin;Lee, Kyung-mu;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.975-977
    • /
    • 2013
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Processing iis open source. You can 2D, 3D, PDF output, using P3D and OpenGL graphics. Also you can check by running a stand-alone application. Through a combination of Arduino, library support, such as sound, video, and computer vision can be expanded, this program is the Android phone and iPhone programming. In this paper, sortware was used for Processing, hardware was used for arduino MegaADK board, After making easy 2axis game, using the software and hardware verification.

  • PDF

On Constructing Fractal Sets Using Visual Programming Language (Visual Programming을 활용한 Fractal 집합의 작성)

  • Geum Young Hee;Kim Young Ik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.3
    • /
    • pp.177-182
    • /
    • 2002
  • In this paper, we present a mathematical theory and algorithm consoucting some fractal sets. Among such fractal sets, the degree-n bifurcation set as well as the Julia sets is defined by extending the concept of the Mandelbrot set to the complex polynomial $Z^n$+c($c{\epsilon}C$, $n{\ge}2$). Some properties of the degree-n bifurcation set and the Julia sets have been theoretically investigated including the symmetry, periodicity, boundedness, and connectedness. An efficient algorithm constructing both the degree-n bifurcation let and the Julia sets is proposed using theoretical results. The mouse-operated software called "MANJUL" has been developed for the effective construction of the degree-n bifurcation set and the Julia sets in graphic environments with C++ programming language under the windows operating system. Simple mouse operations can construct ann magnify the degree-n bifurcation set as well af the Julia sets. They not only compute the component period but also save the images of the degree-n bifurcation set and the Julia sets to visually confirm various properties and the geometrical structure of the sets. A demonstration has verified the useful versatility of MANJUL.of MANJUL.

  • PDF

Sensor Network Simulator for Ubiquitous Application Development (유비쿼터스 응용 개발을 위한 센서 네트워크 시뮬레이터)

  • Kim, Bang-Hyun;Kim, Jong-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.358-370
    • /
    • 2007
  • Software simulations have been widely used for the design and application development of a wireless sensor network that is an infrastructure of ubiquitous computing. In this study, we develop a sensor network simulator that can verify the behavior of sensor network applications, estimate execution time and power consumption, and simulate a large-scale sensor network. To implement the simulator, we use an instruction-level parallel discrete-event simulation method. Instruction-level simulation uses executable images loaded into a real sensor board as workload, such that it results in the high degree of details. Parallel simulation makes simulation of a large-scale sensor network possible by distributing workload into multiple computers. The simulator can predict the amount of power consumption based on operating time of modules in a sensor node and counting the number of executed instructions by kind. Also it can simulate ubiquitous applications with various scenarios and debug programs. Instruction traces used as workload for simulations are executable images produced by the cross-compiler for ATmega128L microcontroller.

An Enhanced Floor Field based Pedestrian Simulation Model (개선된 Floor Field 기반 보행 시뮬레이션 모델)

  • Jun, Chul-Min
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.76-84
    • /
    • 2010
  • Many pedestrian simulation models for micro-scale spaces as building indoor areas have been proposed for the last decade and two models - social force model and floor field model - are getting attention. Among these, CA-based floor field model is viewed more favourable for computer simulations than computationally complex social force model. However, Kirchner's floor field model has limitations in capturing the differences in dynamic values of different agents and this study proposes an enhanced algorithm. This study improved the floor field model in order for an agent to be able to exclude the influences of its own dynamic values by changing the data structure, and, also modified the initial dynamic value problem in order to fit more realistic environment. In the simulations, real 3D building data stored in a spatial DBMS were used considering future integration with indoor localization sensors and real time applications.

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

A Study on the 4-bit Microwave Phase Shiftter with PIN Diode (PIN 다이오드를 이용한 초고주파 4-비트 위상기에 관한 연구)

  • Cho, Young-Song;Kweon, Heag-Joong;Lee, Young-Chul;Shin, Chull-Chai
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.2
    • /
    • pp.47-54
    • /
    • 1990
  • In this paper, we design the 4-bit phase shifter which have $22.5^{\circ},45^{\circ},90^{\circ}$ and $180^{\circ}$ phase shift by applying the loaded line and switched network phase shifter. Its phase shift is variable with changing of the stub and passive device parameters. The experiments show the 6.5 dB average insertion loss and $10^{\circ}$ average phase error at center frequency, 6GHz. The results of experiment agree well with the theories except $180^{\circ}$ phase shifter.

  • PDF

An Analysis of Formability of Micro Pattern Forming on the Thin Sheet Metal (마이크로 박판 미세 패턴 성형공정의 성형성에 대한 해석적 연구)

  • Cha, Sung-Hoon;Shin, Myung-Soo;Kim, Jong-Ho;Lee, Hye-Jin;Kim, Jong-Bong
    • Elastomers and Composites
    • /
    • v.44 no.4
    • /
    • pp.384-390
    • /
    • 2009
  • Roll-to-roll forming process is one of important metal processing technology because the process is simple and economical. These days, with these merits, roll-to-roll forming process is tried to be employed in manufacturing the circuit board, barrier ribs and solar cell plate. The solar cell plate may have millions of patterns, and the analysis of forming considering all the patterns is impossible due to the computational costs. In this study, analyses are carried out for various numbers of patterns and the results are compared. It is shown that the analyses results with four row patterns and twelve row patterns are same. So, it is considered that the analysis can be carried out for only four rows of pattern for the design of incremental roll-to-roll forming process. Also formability is analysed for various number of mesh, protrusion shapes and forming temperature.