• Title/Summary/Keyword: 측정헤드

Search Result 365, Processing Time 0.027 seconds

Optimizing Boot Stage of Linux for Low-power ARM Embedded Devices (리눅스기반 저전력 ARM 임베디드 장비의 부팅과정 최적화)

  • Kim, Jongseok;Yang, Jinyoung;Kim, Daeyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.137-140
    • /
    • 2013
  • Conventionally embedded devices used simple operating system (OS); however, the number of embedded devices using Linux as OS is increasing to keep up with hardware's performance improvement and customer's various needs. While embedded devices using Linux can take advantage of expandability, generality, portability, Linux's flexibility nature may cause undesirable overheads because of its increased complexity. One such overhead makes boot stage optimization essential in most embedded systems, where many features are redundant and possible to be removed or reconfigured. This paper applies well-known software optimization technique for Linux's boot stage to an CLM9722 DTK, measures the results, and studies about limitation of such techniques from hardware dependancy on the standard framework of Linux. The booting time from power-on until completion were decreased by 33% approximately.

  • PDF

A WPHR Service for Wellness in the Arduino Environment (아두이노 환경에서 웰니스를 위한 WPHR 서비스)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.83-90
    • /
    • 2018
  • In this paper, we propose an algorithm for analyzing personal health log information in android environment, providing personal health log information in android environment, providing personalized exercise information and monitoring the condition of pedestrians. Personal health log data collection is performed based on raw data of user using MPU6050 sensor based on Arduino. Noise was removed and age threshold was applied to distinguish movement information. In addition, to protect personal information, safety is enhanced by providing anti-compilation prevention and encryption/decryption of APK file, and the result of movement information collection is measured according to sensor location. Experimental results showed that the MPU6050 sensor mounted one the ankle wsa measured 98.97% more accurately then the wrist. In addition, the loading time of SEED 128 bit encryption based DEX file has the average time of 0.55ms, minimizing the overhead.

A dual-loop boost-converter LED driver IC with temperature compensation (온도 보상 및 듀얼 루프를 이용한 부스트 컨버터 LED 드라이버 IC)

  • Park, Ji-Hoon;Yoon, Seong-Jin;Hwang, In-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.29-36
    • /
    • 2015
  • This paper presents an LED backlight driver IC consisting of three linear current regulators and an output-voltage regulation loop with a self-adjustable reference voltage. In the proposed LED driver, the output voltage is controlled by dual feedback loops. The first loop senses and controls the output voltage, and the second loop senses the voltage drop of the linear current regulator and adjusts the reference voltage. With these feedback loops, the voltage drop of the linear current regulator is maintained at a minimum value, at which the driver efficiency is maximized. The output of the driver is a three-channel LED setup with four LEDs in each channel. The luminance is adjusted by the PWM dimming signal. The proposed driver is designed by a $0.35-{\mu}m$ 60-V high-voltage process, resulting in an experimental maximum efficiency of approximately 85%.

Sanitization of Open-Source Based Deduplicated Filesystem (오픈 소스 중복 제거 파일시스템에서의 완전 삭제)

  • Cho, Hyeonwoong;Kim, SeulGi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1141-1149
    • /
    • 2016
  • Deduplicated filesystem can reduce usage of storage. However, it be able to recover deleted block. We studied sanitization of deduplicated filesystem, LessFS which is based on FUSE(Filesystem in USErspace). First, we show a vulnerability recover deleted data in the deduplicated filesystem. We implement sanitization of deduplicated filesystem considering the part of fingerprint DB with data blocks. It takes 60~70 times compared to without sanitization. Which means access time to fingerprint DB and overhead derived from increase of number of chunk have a critical impact on sanitization time. But in case of more than 65,536 Byte of chunksize, it is faster than normal filesystem without deduplication.

A study on the ultra precision machining of free-form molds for advanced head-up display device (첨단 헤드업 디스플레이 장치용 비구면 자유형상 금형의 초정밀 가공에 관한 연구)

  • Park, Young-Durk;Jang, Taesuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.290-296
    • /
    • 2019
  • Head-up displays for vehicles play an important role in displaying various information about the safety and convenience of driving on the windshield of the vehicle. In this study, ultra-precision machining was performed and evaluated as a method for machining a large-area aspheric free-form mirror that is applicable to augmented reality technology. Precision diamond cutting is highly accurate and suitable for the production of advanced parts with excellent surface integrity, low surface roughness, and low residual stress. By using an aspheric free-form mold, it is possible to improve the optical transfer function, reduce the distortion path, and realize a special image field curvature. To make such a mold, the diamond cutting method was used, and the result was evaluated using an aspherical shape-measuring machine. As a result, it was possible to the mold with shape accuracy (PV) below $1{\mu}m$ and surface roughness (Ra) below $0.02{\mu}m$.

Device Control System based on Brain Wave Data (뇌파데이터 기반의 디바이스 제어 시스템)

  • Lee, So-Hyun;Lee, Ye-Jeong;Lee, Seok-cheol;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.813-815
    • /
    • 2016
  • This paper implements a device control system based on the brain wave data. Brain-Computer Interface (BCI) technology can pass directly to the system without going through the operation of the language or body. By controlling the device to detect brain waves in real time according to the change of status it helps to ease life for a variety of services, such as disabled people with limited mobility or students, people who need multi-tasking. In addition, it is possible to develop an application service such as the home device control system. A device control system implemented in the paper based on the data collected from the EEG Headset associated to control the power of the smart phone and audio. Control the power ON / OFF operation by the Attention, and support service functions to control the audio by the Meditation and Eye blink. It was confirmed that the device control using the brain wave data to be operated through a laboratory test successfully.

  • PDF

Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events (비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지)

  • Kim, Hodong;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1255-1261
    • /
    • 2020
  • Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared cache resources in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud systems recently, many detection strategies have been proposed. Since the conventional cache side-channel attacks are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor mostly cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, attack detection mechanisms based on cache events may hardly detect the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.

Design and Implementation of a Cloud-based Linux Software Practice Platform (클라우드 기반 리눅스 SW 실습 플랫폼의 설계 및 구현 )

  • Hyokyung Bahn;Kyungwoon Cho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.67-71
    • /
    • 2023
  • Recently, there are increasing cases of managing software labs by assigning virtual PCs in the cloud instead of physical PCs to each student. In this paper, we design and implement a Linux-based software practice platform that allows students to efficiently build their environments in the cloud. In our platform, instructors can create and control virtual machine templates for all students at once, and students practice on their own machines as administrators. Instructors can also troubleshoot each machine and restore its state. Meanwhile, the biggest obstacle to implementing this approach is the difficulty of predicting the costs of cloud services instantly. To cope with this situation, we propose a model that can estimate the cost of cloud resources used. By using daemons in each user's virtual machine, we instantly estimate resource usage and costs. Although our model has very low overhead, the predicted results are very close to the actual resource usage measured by cloud service providers. To further validate our model, we used the proposed platform in a Linux practice lecture for a semester and confirmed that the proposed model is very accurate.

Autoscaling Mechanism based on Execution-times for VNFM in NFV Platforms (NFV 플랫폼에서 VNFM의 실행 시간에 기반한 자동 자원 조정 메커니즘)

  • Mehmood, Asif;Diaz Rivera, Javier;Khan, Talha Ahmed;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • The process to determine the required number of resources depends on the factors being considered. Autoscaling is one such mechanism that uses a wide range of factors to decide and is a critical process in NFV. As the networks are being shifted onto the cloud after the invention of SDN, we require better resource managers in the future. To solve this problem, we propose a solution that allows the VNFMs to autoscale the system resources depending on the factors such as overhead of hyperthreading, number of requests, execution-times for the virtual network functions. It is a known fact that the hyperthreaded virtual-cores are not fully capable of performing like the physical cores. Also, as there are different types of core having different frequencies so the process to calculate the number of cores needs to be measured accurately and precisely. The platform independency is achieved by proposing another solution in the form of a monitoring microservice, which communicates through APIs. Hence, by the use of our autoscaling application and a monitoring microservice, we enhance the resource provisioning process to meet the criteria of future networks.

The Measurement of Korean Face Skin Rigidity for a Robotic Headform of Respiratory Protective Device Testing (호흡보호구 평가용 얼굴 로봇을 위한 한국인 얼굴 피부의 경도 측정)

  • Eun-Jin Jeon;Young-jae Jung;Ah-lam Lee;Hee-Eun Kim;Hee-Cheon You
    • Fashion & Textile Research Journal
    • /
    • v.25 no.2
    • /
    • pp.248-254
    • /
    • 2023
  • This study aims to measure the skin rigidity of different facial areas among Koreans and propose guidelines for each area's skin rigidity that can be applied with a facial robot for testing respiratory protective devices. The facial skin rigidity of 40 participants, which included 20 men and 20 women, aged 20 to 50, was analyzed. The rigidity measurement was conducted in 13 facial areas, including six areas in contact with the mask and seven non-contact areas, by referring to the facial measurement guidelines of Size Korea. The facial rigidity was measured using the Durometer RX-1600-OO while in a supine position. The measurement procedure involved contacting the durometer vertically with the reference point, repeating the measurement of the same area five times, and using the average of three values whose variability was between 0.4 and 4.2 Shore OO. The rigidity data analysis used precision analysis, descriptive statistics analysis, and mixed-effect ANOVA. The analysis confirmed the rigidity of the 13 measurement areas, with the highest rigidity of the face being at the nose and forehead points, with values of 51.2 and 50.8, respectively, and the lowest rigidity being at the chin and center of the cheek points, with values of 19.2 and 20.7, respectively. Significant differences between gender groups were observed in four areas: the tip of the nose, the point below the chin, the area below the lower jaw, and the inner concha.