• Title/Summary/Keyword: S-SMART system

Search Result 2,428, Processing Time 0.038 seconds

Received Power Regulation of LF-Band Wireless Power Transfer System Using Bias Control of Class E Amplifier (E급 증폭기의 바이어스 조정을 통한 LF-대역 무선 전력 전송시스템의 수신 전력 안정화)

  • Son, Yong-Ho;Han, Sang-Kyoo;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.9
    • /
    • pp.883-891
    • /
    • 2013
  • In wireless smart phone charging scenario, the transmitter pad is larger than the size of the receiver pad. Thus, it is important to supply a constant power to the receiver regardless of its location. In this paper, we propose a new method to regulate the receiver's power by adjusting a drain bias of class E power amplifier. The proposed LF-band wireless power transfer system is as follows: a buck converter power supply which is controlled by a pulse width modulation(PWM) IC TL494, a class E amplifier using a low cost IRF510 power MOSFET, a transmitter coil whose dimension is $16cm{\times}18cm$, a receiver coil whose dimension is $6cm{\times}8cm$, and a full bridge rectifier using Schottky diodes. A measured performance show a maximum output power of 4 W and system efficiency of 67 % if we fix the bias voltage. If we adjust the bias voltage, the received power can be maintained at a constant power of 2 W regardless of receiver pad location.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

The Impact of Organizational Safety Culture on the Resilience Ability : Focused on the Construction Industry (조직의 안전문화가 레질리언스 역량에 미치는 영향 : 건설업을 중심으로)

  • Chu, Chan Ho;An, Kang Min;Baek, Dong Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.73-85
    • /
    • 2021
  • The construction industry is considered to be a fatal accident industry, accounting for 28.5% of the total industrial accidents in 2017, as the number of industrial accidents in the construction industry has steadily increased over the past decade. So it is necessary to consider introducing Resilience Engineering, which is actively applied to risky industries around the world, to drastically reduce construction accidents. Although Resilience Engineering, which has emerged as the next-generation safety management centered on Hollnagel since the 2000s, claims the importance of strengthening Resilience abilities considering organizational structure and culture, most studies focus only on developing evaluation indicators. The purpose of this study is to analyze the impact of an organization's safety culture on its Resilience abilities in the construction industry. Specifically, it conducted empirical analysis on the impact of safety culture consisting of 'communication, leadership and safety systems' on the Resilience abilities(responding ability, monitoring ability, learning ability, anticipating ability), and the mediation relationship between leadership, communication, and safety system. The survey was conducted on construction workers, and an empirical analysis was conducted on the final 154 responses using SPSS 25 and Smart PLS 3. The results showed that the safety system had a significant impact on all Resilience Abilities, and communication had a significant impact on the remaining three except for anticipating ability among Resilience Abilities. On the other hand, leadership has been shown to have a significant impact on anticipating ability only. In the verifying of the mediation relationship between leadership, communication and safety systems, it was found that leadership affects all Resilience abilities by means of safety systems, but communication can only affect responding ability. This study has practical significance in that it suggests the need for policy-level efforts to introduce and apply Resilience Engineering and then expanded the effective safety management assessment of the construction industry in the future. Moreover, the academic implications are important in that the study attempted to expand the academic scope for a paradigm shift in the future as the safety culture has identified its impact on the Resilience abilities.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

Effect of Total Resistance of Electrochemical Cell on Electrochemical Impedance of Reinforced Concrete Using a Three-Electrode System (3전극방식을 활용한 철근 콘크리트의 교류임피던스 측정 시 전기화학 셀저항의 영향)

  • Khan, Md. Al-Masrur;Kim, Je-Kyoung;Yee, Jurng-Jae;Kee, Seong-Hoon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.6
    • /
    • pp.82-92
    • /
    • 2022
  • This study aims to investigate the effect of total electrochemical cell resistance (TECR) on electrochemical impedance (EI) measurements of reinforced concrete (RC) by electrochemical impedance spectroscopy (EIS) using a three-electrode system. A series of experimental study is performed to measure electrochemical behavior of a steel bar embedded in a concrete cube specimen, with a side length of 200 mm, in various experimental conditions. Main variables include concrete dry conditions, coupling resistance between sensing electrodes and concrete surface, and area of the counter electrode. It is demonstrated that EI values remains stable when the compliant voltage of a measuring device is sufficiently great compared to the potential drop caused by TECR of concrete specimens. It is confirmed that the effect of the coupling resistance of TECR is far more influential than other two factors (concrete dry conditions and area of the counter electrode). The results in this study can be used as a fundamental basis for development of a surface-mount sensor for corrosion monitoring of reinforced concrete structures exposed to wet-and-dry cycles under marine environment.

Case Study on the Leadership Shifts in Smart Phone Industry: Rise of China and Falling Behind of Korea (스마트폰 산업에서의 주도권 이전: 중국의 부상과 우리나라의 쇠퇴에 관한 사례 연구)

  • Kwak, Kiho;Lee, Eunju
    • Journal of Technology Innovation
    • /
    • v.26 no.2
    • /
    • pp.95-128
    • /
    • 2018
  • Since mid and late 2000s, the smartphones has been widely diffused and Korea ranked first in global smartphone market in 2011 thanks to its rapid adoption of Android operating system, technology capability accumulated in featurephone development, vertical integration on smartphone production and premium positioning. However, Korea fell behind because of the rise of another latecomer, China, in four years (2015) after it recorded the top position globally. How did the leadership change occurred in the smartphone industry so rapidly? In order to answer the question, we investigated three favorable windows of opportunity for the rise of China, which are technological, demand, and institutional, and the strategic responses of Chinese firms as well as the rigidity and complacency with the past success of Korean firms. Our findings contribute to the extension of 'catch-up cycle' theory as well as provide in-depth insights for strategies and policies settings to overcome the recent rise of China in information and communication technology sector for Korea.

A Study on Deep Learning Methodology for Bigdata Mining from Smart Farm using Heterogeneous Computing (스마트팜 빅데이터 분석을 위한 이기종간 심층학습 기법 연구)

  • Min, Jae-Ki;Lee, DongHoon
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2017.04a
    • /
    • pp.162-162
    • /
    • 2017
  • 구글에서 공개한 Tensorflow를 이용한 여러 학문 분야의 연구가 활발하다. 농업 시설환경을 대상으로 한 빅데이터의 축적이 증가함과 아울러 실효적인 정보 획득을 위한 각종 데이터 분석 및 마이닝 기법에 대한 연구 또한 활발한 상황이다. 한편, 타 분야의 성공적인 심층학습기법 응용사례에 비하여 농업 분야에서의 응용은 초기 성장 단계라 할 수 있다. 이는 농업 현장에서 취득한 정보의 난해성 및 완성도 높은 생육/환경 모델링 정보의 부재로 실효적인 전과정 처리 기술 도출에 소요되는 시간, 비용, 연구 환경이 상대적으로 부족하기 때문일 것이다. 특히, 센서 기반 데이터 취득 기술 증가에 따라 비약적으로 방대해진 수집 데이터를 시간 복잡도가 높은 심층 학습 모델링 연산에 기계적으로 단순 적용할 경우 시간 효율적인 측면에서 성공적인 결과 도출에 애로가 있을 것이다. 매우 높은 시간 복잡도를 해결하기 위하여 제시된 하드웨어 가속 기능의 경우 일부 개발환경에 국한이 되어 있다. 일례로, 구글의 Tensorflow는 오픈소스 기반 병렬 클러스터링 기술인 MPICH를 지원하는 알고리즘을 공개하지 않고 있다. 따라서, 본 연구에서는 심층학습 기법 연구에 있어서, 예상 가능한 다양한 자원을 활용하여 최대한 연산의 결과를 빨리 도출할 수 있는 하드웨어적인 접근 방법을 모색하였다. 호스트에서 수행하는 일방적인 학습 알고리즘과 달리 이기종간 심층 학습이 가능하기 위해선 우선, NFS(Network File System)를 이용하여 데이터 계층이 상호 연결이 되어야 한다. 이를 위해서 고속 네트워크를 기반으로 한 NFS의 이용이 필수적이다. 둘째로 제한된 자원의 한계를 극복하기 위한 메모 공유 라이브러리가 필요하다. 셋째로 이기종간 프로세서에 최적화된 병렬 처리용 컴파일러를 이용해야 한다. 가장 중요한 부분은 이기종간의 처리 능력에 따른 작업을 고르게 분배할 수 있는 작업 스케쥴링이 수행되어야 하며, 이는 처리하고자 하는 데이터의 형태에 따라 매우 가변적이므로 해당 데이터 도메인에 대한 엄밀한 사전 벤치마킹이 수행되어야 한다. 이러한 요구조건을 대부분 충족하는 Open-CL ver1.2(https://www.khronos.org/opencl/)를 이용하였다. 최신의 Open-CL 버전은 2.2이나 본 연구를 위하여 준비한 4가지 이기종 시스템에서 모두 공통적으로 지원하는 버전은 1.2이다. 실험적으로 선정된 4가지 이기종 시스템은 1) Windows 10 Pro, 2) Linux-Ubuntu 16.04.4 LTS-x86_64, 3) MAC OS X 10.11 4) Linux-Ubuntu 16.04.4 LTS-ARM Cortext-A15 이다. 비교 분석을 위하여 NVIDIA 사에서 제공하는 Pascal Titan X 2식을 SLI로 구성한 시스템을 준비하였다. 개별 시스템에서 별도로 컴파일 된 바이너리의 이름을 통일하고, 개별 시스템의 코어수를 동일하게 균등 배분하여 100 Hz의 데이터로 입력이 되는 온도 정보와 조도 정보를 입력으로 하고 이를 습도정보에 Linear Gradient Descent Optimizer를 이용하여 Epoch 10,000회의 학습을 수행하였다. 4종의 이기종에서 총 32개의 코어를 이용한 학습에서 17초 내외로 연산 수행을 마쳤으나, 비교 시스템에서는 11초 내외로 연산을 마치는 결과가 나왔다. 기보유 하드웨어의 적절한 활용이 가능한 심층학습 기법에 대한 연구를 지속할 것이다

  • PDF

A Study on Applying Information Framework for BIM Based WBS -Focusing on Civil Construction- (BIM기반의 WBS 구축을 위한 정보프레임워크 도입방안 연구 -토목사업의 적용을 중심으로-)

  • Nam, Jeong-Yong;Jo, Chan-Won;Park, So-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.770-777
    • /
    • 2017
  • Building information modeling (BIM) has been receiving attention as an integrated information model instead of CAD since the 2000s. BIM technology was first used in the architectural field and was later introduced to the civil engineering field. However, the government announced a plan for the application of BIM to 20% of all SOC projects from 2020, so the adoption of BIM technology is expected to accelerate. In order to successfully adopt BIM, a systematic structure should be supported for integrated design information and implementation technology. Also, it is important to establish the relationship between information systems because many complicated factors are intertwined in the construction industry. In this study, we propose a framework for constructing integrated information through identifying the information relations for introducing BIM in the civil engineering industry. We applied this framework to a bridge project to confirm its effectiveness. This study can be applied to the integrated management of the construction process and costs by introduction of a work breakdown structure (WBS) to BIM. In addition, this study is expected to contribute to the adoption of BIM in the civil engineering field through the proposal of information system standardization in this field.

Cost Comparison of Androgen Deprivation Therapy and Radical Prostatectomy for Prostate Cancer (전립선암의 남성호르몬 박탈 치료와 근치적 전립선적출술의 비용 분석)

  • Kim, Jang Mook;Rho, Mi Jung;Jang, Kwang Soo;Park, Yong Hyun;Lee, Ji Youl;Choi, In Young
    • Korea Journal of Hospital Management
    • /
    • v.23 no.3
    • /
    • pp.28-38
    • /
    • 2018
  • Purpose: To evaluate the medical expenditures for prostate cancer patients, including out-of-pocket costs, and compared the costs between androgen deprivation therapy and radical prostatectomy treatment. Methodology: This study combined clinical data from 357 prostate cancer patients from the Smart Prostate Cancer Database and the medical expenditure data from the claims and cost databases. We used the independent two-sample t-tests to compare androgen deprivation therapy and radical prostatectomy. Multivariable logistic regression analysis was conducted to identify determining factors for androgen deprivation therapy and radical prostatectomy treatments. Findings: The medical costs of androgen deprivation therapy treatment were much lower than radical prostatectomy treatment at the one year and remained lower until the fourth-year. However, after four years, the accumulated medical expenditures of androgen deprivation therapy become significantly higher than radical prostatectomy treatment. Patients with a higher cancer stage and older age had higher chances of being treated using androgen deprivation therapy treatment than radical prostatectomy treatment. Practical Implications: Our results show that early detection of cancer reduces the treatment cost for both patients and insurance payers. It also demonstrates that cost comparisons should be conducted over long periods of time in order to most accurately assess the costs.

UbiController: Universal Mobile System for Controlling Appliances in Smart Home Environment (UbiController: 스마트 홈 환경의 가전기기 제어를 위한 통합 모바일 시스템)

  • Yoon, Hyo-Seok;Kim, Hye-Jin;Woo, Woon-Tack;Lee, Sang-Goog
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1059-1071
    • /
    • 2008
  • Users in ubiquitous computing environment can easily access and use a multitude of devices and services anywhere and anytime. The key technology to realize this scenario is the method to intuitively provide proper user interfaces for each device and service. Previous attempts simply provided a designated user interface for each device and service or provided an abstract user interface to control common functions of different services. To select a target appliance, either user directly specified the target device or depended on sensors such as RFID tags and readers limiting the applicable scenarios. In this paper, we present UbiController which uniquely uses camera on the mobile device to recognize markers of appliances to acquire user interface for controlling task. UbiController aims to provide automatic discovery of multiple services in the smart home environment, support traditional GUI and novel camera-based recognition method as well as intuitive interaction methods for users. In this paper, we show experiments on the performance of UbiController's discovery and recognition methods and user feedback on interaction methods from a user study.

  • PDF