• Title/Summary/Keyword: Digital Access

Search Result 1,438, Processing Time 0.024 seconds

Multi-access for the Diagnosis of Missed Upper Lumbar Disc Herniation

  • Lee, Dong-Yeob;Kim, Hyung-Seok;Lee, Sang-Ho
    • Journal of Korean Neurosurgical Society
    • /
    • v.38 no.2
    • /
    • pp.144-146
    • /
    • 2005
  • Herein, a case of missed upper lumbar disc herniation, diagnosed by thorough neurological examination, digital infrared thermographic imaging[DITI], and repeated magnetic resonance[MR] image study, is reported. A 36-year-old female presented with intractable leg pain on left anterior thigh. Although she underwent lumbar MR image at other hospital, she was misdiagnosed as acute sprain. Neurological examination suggested the possibility of upper lumbar disc herniation, which was confirmed by DITI, MRI, and selective root block. After operation, her leg pain was significantly improved. It should be considered that upper lumbar disc herniation might be misdiagnosed as an acute sprain, as in our case. A high index of suspicion based on thorough neurological examination is most important in such cases. Then, multi-access such as DITI, MR image, and selective block, base on thorough neurological examination, are warranted.

Gateway Platform for Connecting D-TRS in Electric Power IT (전력 IT용 D-TRS 접속을 위한 게이트웨이 플랫폼)

  • Song, Byung-Kwen;Jeong, Tae-Eui
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.1
    • /
    • pp.45-54
    • /
    • 2009
  • TETRA(Terrestrial Trunked Radio) is the standard of D-TRS(Digital Trunked Radio System) developed by the ETSI(European Telecommunications Standards Institute). Currently, TETRA has been selected as Electric Power IT Wireless Backbone Network. Traditional distribution automation system has used the wireless network of Mobile Service Provider using CDMA(Code-Division Multiple Access) and WCDMA(Wideband CDMA) modem. Therefore, the development of gateway platform is indispensable according to the change to TETRA network. In this paper, we propose an embedded Linux-based Gateway platform for transmitting Industrial Electric Power IT protocol using TETRA network.

Design of pitch parameter search architecture for a speech coder using dual MACs (Dual MAC을 이용한 음성 부호화기용 피치 매개변수 검색 구조 설계)

  • 박주현;심재술;김영민
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.5
    • /
    • pp.172-179
    • /
    • 1996
  • In the paper, QCELP (qualcomm code excited linear predictive), CDMA (code division multiple access)'s vocoder algorithm, was analyzed. And then, a ptich parameter seaarch architecture for 16-bit programmable DSP(digital signal processor) for QCELP was designed. Because we speed up the parameter search through high speed DSP using two MACs, we can satisfy speech codec specifiction for the digital celluar. Also, we implemented in FIFO(first-in first-out) memory using register file to increase the access time of data. This DSP was designed using COMPASS, ASIC design tool, by top-down design methodology. Therefore, it is possible to cope with rapid change at mobile communication market.

  • PDF

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Study on the Job Execution Time of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 작업 실행 시간에 대한 연구)

  • Jung, Sung Min;Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.99-105
    • /
    • 2012
  • Given the numbers of smartphones, tablets and other mobile devices shipped every day, more and more users are relying on the cloud as the main driver for satisfying their computing needs, whether it is data storage, applications or infrastructure. Mobile cloud computing is simply cloud computing in which at least some of the devices involved are mobile. Each node is owned by a different user and is likely to be mobile. Using mobile hardware for cloud computing has advantages over using traditional hardware. These advantage include computational access to multimedia and sensor data without the need for large network transfer, more efficient access to data stored on other mobile devices and distributed ownership and maintenance of hardware. It is important to predict job execution time in mobile cloud computing because there are many mobile nodes with different capabilities. This paper analyzes the job execution time for mobile cloud computing in terms of network environment and heterogeneous mobile nodes using a mathematical model.

The study on the WiBro digital optic repeater design (휴대인터넷 디지털 광 중계기 설계에 대한 연구)

  • Ahn Jun-Bae;Ryoo Kyoo-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.35-38
    • /
    • 2006
  • Using the repeaters is indispensable to WiBro services. Repeater types are distinguished by usage, output power and required performance. In the paper, we have studied on the WiBro digital optic repeater design which has excellent performance characteristic than any other repeaters. WiBro has specific characteristic on modulation method TDD(Time Division Duplex)/OFDMA(Orthogonal Frequency Division Multiple Access) so that it demands specified H/W to design WiBro repeater. Switching technique has been introduced because of TDD characteristic in each amplifier on the repeater. Time Advance technique has been considered because of OFDM characteristic among RAS(Radio Access Station) and repeater. In this paper, we have studied on these techniques to increase repeater cell coverage and distance between RAS and repeater.

  • PDF

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying

  • Huang, Jun;Yin, Haibing
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1272-1285
    • /
    • 2018
  • The paper presents a novel embedded multifunctional media sever (EMMS) for mobile devices to receive various media programs. Being different from other contemporary system research, the paper mainly studies how to design a reception solution for terrestrial digital television (DTV) on mobile devices and how to enable mobile devices can receive DTV program, enjoy video-on-demand (VOD), achieve video surveillance and relay Internet video program via local Wi-Fi simultaneously. In the system design, we integrate broadcasting-terrestrial DTV tuner, streaming media re-transmission system, VOD disk, video camera and access interface to the Internet into EMMS, which can either receive terrestrial DTV radio signals and demodulate out digital transport stream (TS), or can read streaming media bit-stream from VOD disk, surveillance camera or access interface to the Internet. The experimental results show the proposed system is stable and quality-efficient. Comparing with the other systems, the proposed system has the least packet loss rate and response time.

Development of Ultrasound B-scanner(II)-Digital Scan Converter- (초음파 B스캔너의 개발(II) -시스템 및 아나로그 부분-)

  • 김영모;이민화
    • Journal of Biomedical Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.85-92
    • /
    • 1984
  • A new architecture of the Digital Scan Converter (DSC) for the linear-scan ultrasound medical imaging systems is proposed and its hardware implementation is reported. While the conventional DSC merely displays the acquisited data and does nor allow access to the frame memory, it is possible, in the new system, to access to the frame memory for further imaging processing so as to obtain useful information for medical diagnosis. Image processing can be performed either by a special pupose processor, or by VAX 11/780. The system is made to operate asyncronously to increase the frame rate with tags assigned to the data. The proposed DSC was designed to be used without much modification for the sector scan system as well.

  • PDF

A Study on Collection Information for Discovery of Distributed Resources in Digital Libraries (디지털도서관에서 분산자원 검색을 위한 장서 정보에 관한 연구)

  • Lee Sung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.185-209
    • /
    • 2005
  • The description of resources at collection-level is being recognised as an important component of information services that seek to provide integrated access to distributed resources. This research investigated the concept, necessities, and standards of collection level description which manages heterogeneous and distributed resources effectively. Also this research reviewed collection level description projects in other countries to show a new direction of subject access in digital libraries.