• Title/Summary/Keyword: Electronic Device

Search Result 4,555, Processing Time 0.034 seconds

A Study on the Propagation Environment for VHF Maritime Digital Communications Operation in South Sea Area (남해안의 VHF 해상디지털통신 운용을 위한 전파환경 연구)

  • Ju, Yang-Ro;Kim, Kab-Ki;Choi, Jo-Cheon;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1310-1316
    • /
    • 2014
  • The IMO has recommended on VHF digital communications operation for sailing ships from 2017. And ships more than 5 tons is obliged to digital communications by fishing Vessels Act and Vessel Safety Act in domestic. The owner of all vessel is equipped to the automatic position reporting device in accordance with the Notice of the Ministry of Oceans and Fisheries to regulations, It shall be ensure to navigations safety and in order to respond quickly in the event of maritime accidents on all vessels. The info-communications station of fishery is operating the automatic position reporting system using the VHF DSC in east sea from 2012, Continuously, which is underway the install plan in south sea and yellow sea. But this plan is very difficult, because of propagation environment is poor on account of complicated coastline and many islands. This paper has analyzed the propagation coverage for position setting of coast station in south sea and the traffic zone set up by compare with RSSI and methode of navigation tracking by VMS.

Manchester coding of compressed binary clusters for reducing IoT healthcare device's digital data transfer time (IoT기반 헬스케어 의료기기의 디지털 데이터 전송시간 감소를 위한 압축 바이너리 클러스터의 맨체스터 코딩 전송)

  • Kim, Jung-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.460-469
    • /
    • 2015
  • This study's aim is for reducing big data transfer time of IoT healthcare devices by modulating digital bits into Manchester code including zero-voltage idle as information for secondary compressed binary cluster's compartment after two step compression of compressing binary data into primary and secondary binary compressed clusters for each binary clusters having compression benefit of 1 bit or 2 bits. Also this study proposed that as department information of compressed binary clusters, inserting idle signal into Manchester code will have benefit of reducing transfer time in case of compressing binary cluster into secondary compressed binary cluster by 2 bits, because in spite of cost of 1 clock idle, another 1 bit benefit can play a role of reducing 1 clock transfer time. Idle signal is also never consecutive because the signal is for compartment information between two adjacent secondary compressed binary cluster. Voltage transition on basic rule of Manchester code is remaining while inserting idle signal, so DC balance can be guaranteed. This study's simulation result said that even compressed binary data by another compression algorithms could be transferred faster by as much as about 12.6 percents if using this method.

Implement module system for detection sudden unintended acceleration (자동차급발진을 감지하기 위한 모듈 시스템 구현)

  • Cha, Jea-Hui;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.255-257
    • /
    • 2017
  • These days automotive markets are launching models that include a variety of IT technologies. Tesla's Tesla model S and Google's unmanned automobiles are emerging one after another. This type of automobile with IT technology provides various convenience to the driver and the driver is getting benefit by various conveience services. on the contrary, it is also true that defects for errors in electronic components cause accidents that threaten the safety of drivers. There is a sudden unintended acceleration among these accidents. The cause of the accident is not clear yet, but the claim that the ECU device caused by the magnetic field causes accident of the car due is the most reliable. But, in Korea, when occur a car sudden unintended acceleration accident, the char maker often claims that an accident occurred due to driver's pedal malfunction. Also most drivers are responsible for the lack of grounds to refute. In this paper, the pedal operation image of the driver is acquired and the sensor is attached to the control part such as the excel and brake so as to discriminate whether the vehicle sudden unintended acceleration accident is the driver's pedal operation error or the fault of. i have implemented a system that can do this.

  • PDF

Smart Headlamp Optics Design with Multi-array LEDs (멀티 어레이 엘이디를 이용한 지능형 전조등 광학 설계)

  • Yu, Jin Hee;Ro, Suk Ju;Lee, Jun Ho;Hwang, Chang Kook;Go, Dong Jin
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.5
    • /
    • pp.231-236
    • /
    • 2013
  • We investigated the optical design of a smart headlamp capable of producing various beam patterns through only on/off modulation of light sources. This was implemented by forming a continuous matrix of beams from discontinuous beam patterns by means of a multi-array LED optical system. As one such optical system, the multi-array LED system is a convenient and economical device for implementing beam patterns with the simple on/off modulation of the light sources. A single optical assembly module can be made by combining a multiple-LED array, optical system module, and electronic control with no need for any additional mechanical components. The present optical system was designed to include a secondary lens and a projection lens mounted at the front of each LED in the array to realize accurate lighting patterns as well as the required luminosity at a distance of 25 m in the forward direction. Finally, we identified and analyzed the patterns implemented by the designed optical system that produced satisfactory performance of high beams and adaptive driving beams (ADB).

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Study on FPGA Design for Rotating LED Display Available Video Output (동영상 표출이 가능한 회전 LED 전광판을 위한 FPGA 설계에 관한 연구)

  • Lim, Young-Sik;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.168-175
    • /
    • 2015
  • In this paper, we propose FPGA design technique for rotating LED display device which is capable of displaying videos with the use of the afterimage effect. The proposed technique is made up of image data correction process based on inverse gamma correction and error diffusion, block interleaving process, and data serial output process. The data correction process based on inverse gamma correction and error diffusion is an image data correction step in which image data received are corrected by inverse gamma correction process to convert the data into linear brightness characteristics, and by error diffusion process to reduce the brightness reduction phenomenon in low-gray-level which is caused by inverse gamma correction. In the block interleaving process, the data of the frames entered transversely are first saved in accordance with entrance order, and then only the longitudinal image data are read. The data serial output process is applied to convert the parallel data in a rotating location into serial data and send them to LED Driver IC, in order to send data which will be displayed on high-speedy rotating LED Bar. To evaluate the accuracy of the proposed FPGA design technique, this paper used XC6SLX45-FG484, a Spartan 6 family of Xilinx, as FPGA, and ISE 14.5 as a design tool. According to the evaluation analysis, it was found that goal values were consistent with simulation values in terms of accurate operation of inverse gamma and error diffusion correction, block interleaving operation, and serialized operation of image data.

A Study On Radiation Detection Using CMOS Image Sensor (CMOS 이미지 센서를 사용한 방사선 측정에 관한 연구)

  • Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2015
  • In this paper, we propose the radiation measuring algorithm and the device composition using CMOS image sensor. The radiation measuring algorithm using CMOS image sensor is based on the radiation particle distinguishing algorithm projected to the CMOS image sensor and accumulated and average number of pixels of the radiation particles projected to dozens of images per second with CMOS image sensor. The radiation particle distinguishing algorithm projected to the CMOS image sensor measures the radiation particle images by dividing them into R, G and B and adjusting the threshold value that distinguishes light intensity and background from the particle of each image. The radiation measuring algorithm measures radiation with accumulated and average number of radiation particles projected to dozens of images per second with CMOS image sensor according to the preset cycle. The hardware devices to verify the suggested algorithm consists of CMOS image sensor and image signal processor part, control part, power circuit part and display part. The test result of radiation measurement using the suggested CMOS image sensor is as follows. First, using the low-cost CMOS image sensor to measure radiation particles generated similar characteristics to that from measurement with expensive GM Tube. Second, using the low-cost CMOS image sensor to measure radiation presented largely similar characteristics to the linear characteristics of expensive GM Tube.

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.