• Title/Summary/Keyword: System Design and Implementation

Search Result 7,376, Processing Time 0.045 seconds

Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security (DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현)

  • Park Sung-Ho;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.27-36
    • /
    • 2005
  • This thesis proposed an effective encryption method for the DCT-based image/video contents and made it possible to operate in a high speed by implementing it as an optimized hardware. By considering the increase in the amount of the calculation in the image/video compression, reconstruction and encryption, an partial encryption was performed, in which only the important information (DC and DPCM coefficients) were selected as the data to be encrypted. As the result, the encryption cost decreased when all the original image was encrypted. As the encryption algorithm one of the multi-mode AES, DES, or SEED can be used. The proposed encryption method was implemented in software to be experimented with TM-5 for about 1,000 test images. From the result, it was verified that to induce the original image from the encrypted one is not possible. At that situation, the decrease in compression ratio was only $1.6\%$. The hardware encryption system implemented in Verilog-HDL was synthesized to find the gate-level circuit in the SynopsysTM design compiler with the Hynix $0.25{\mu}m$ CMOS Phantom-cell library. Timing simulation was performed by Verilog-XL from CadenceTM, which resulted in the stable operation in the frequency above 100MHz. Accordingly, the proposed encryption method and the implemented hardware are expected to be effectively used as a good solution for the end-to-end security which is considered as one of the important problems.

Design and Implementation of a Multi-Interface Mobile Gateway for Seamless Handoff Sciences (끊김 없는 핸드오프를 위한 다중 인터페이스 이동형 게이트웨이 설계 및 구현)

  • Choi, Hyun-Jun;Lee, Chae-Seok;Lee, Sung-Ho;Kim, Jong-Deck
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.474-482
    • /
    • 2012
  • Mobile Gateway(MG) is a wireless LAN device to provide internet services to a passenger on vehicles like a bus. For using internet services, MG connects the Road Side Unit AP(RSU AP) based on WLAN .To provide a stable communication service on the moving vehicle, handoff changing MG's RSU must be handled fast and stably. However, it has a physical limits to remove a disconnection time of handoff process by reason of its technological features. In this paper, we suggest a MIMG(Multi-Interface Mobile Gateway) executing seamless handoff by using multiple wireless LAN interfaces for connecting RSU. In the detailed way to do stable handoff, we suggest the "Link Sharing Technique" to disconnection time of packet transmission for RSU to MIMG and the "Path Sharing Technique" to remove disconnection time of packet transmission for MIMG to RSU. we implemented the MIMG which performs the suggested handoff technique. We confirmed the superiority of our system by remove of the disconnection time(0 ms), and improved over 50 % of the communication bandwidth.

The Development of Confocal Microscopy Using the Amplified Double-compound Flexure Guide (레버 증폭 구조의 플렉서를 이용한 공초점 현미경의 개발)

  • Lee, Sang-Won;Kim, Wi-Han;Jung, Young-Dae;Park, Min-Kyu;Kim, Jee-Hyun;Lee, Sang-In;Lee, Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.1
    • /
    • pp.46-52
    • /
    • 2011
  • A confocal microscope was developed utilizing a scanning sample stage based on a home-built double-compound flexure guide. A scanning sample stage with nano-scale resolution consisted of a double leaf spring based flexure, a displacement amplifying lever, a Piezo-electric Transducer(PZT) actuator and capacitance sensors. The performance of the two-axis stage was analyzed using a commercial finite element method program prior to the implementation. A single line laser was employed as the light source along with the Photo Multiplier Tube(PMT) that served as the detector. The performance of the developed confocal microscope was evaluated with a mouse ear skin imaging test. The designed scanning stage enabled us to build the confocal microscope without the two optical scanning mirror modules that are essential in the conventional laser scanning confocal microscope. The elimination of the scanning mirror modules makes the optical design of the confocal microscope simpler and more compact than the conventional system.

Network-adaptive H.264 Video Streaming over IEEE 802.11e (IEEE 802.11e에서 네트워크 적응적인 H.264 비디오 스트리밍)

  • Lee, Sun-Hun;Chung, Kwang-Sue
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.6-16
    • /
    • 2008
  • An instable wireless channel condition causes more packet losses and retransmissions due to interference, fading, station mobility, and so on. Therefore video streaming service over a wireless networks is a challenging task because of the changes in the wireless channel conditions and time-constraints characteristics of the video streaming services. To provide efficient video streaming over a wireless networks, QoS-enhanced MAC protocol, IEEE 802.11e, is standardized recently. Tn this paper, we propose a new network-adaptive H.264 video streaming mechanism in the IEEE 802.11e wireless networks. To improve the quality of video streaming services, video stream has to adapt to the changes in the wireless channel conditions. The wireless channel conditions are estimated by the packet loss probability and informed to the application layer by the cross-layering. According to the wireless channel information, the video streaming application filters out the low-priority data. This adaptation mechanism efficiently uses system resources because it drops the low-priority data in advance. Therefore, our cross-layer design can provide improved video streaming services to the end-user. Through the implementation and performance evaluation, we prove that the proposed mechanism improves the QoS of the video streaming by providing the smoothed playback.

A Study on Information Bias Perceived by Users of AI-driven News Recommendation Services: Focusing on the Establishment of Ethical Principles for AI Services (AI 자동 뉴스 추천 서비스 사용자가 인지하는 정보 편향성에 대한 연구: AI 서비스의 윤리 원칙 수립을 중심으로)

  • Minjung Park;Sangmi Chai
    • Knowledge Management Research
    • /
    • v.25 no.3
    • /
    • pp.47-71
    • /
    • 2024
  • AI-driven news recommendation systems are widely used today, providing personalized news consumption experiences. However, there are significant concerns that these systems might increase users' information bias by mainly showing information from limited perspectives. This lack of diverse information access can prevent users from forming well-rounded viewpoints on specific issues, leading to social problems like Filter bubbles or Echo chambers. These issues can deepen social divides and information inequality. This study aims to explore how AI-based news recommendation services affect users' perceived information bias and to create a foundation for ethical principles in AI services. Specifically, the study looks at the impact of ethical principles like accountability, the right to explanation, the right to choose, and privacy protection on users' perceptions of information bias in AI news systems. The findings emphasize the need for AI service providers to strengthen ethical standards to improve service quality and build user trust for long-term use. By identifying which ethical principles should be prioritized in the design and implementation of AI services, this study aims to help develop corporate ethical frameworks, internal policies, and national AI ethics guidelines.

Design and Implementation of a Cardiac Arrest Supporting System Using Wearable Device (웨어러블 기기를 사용한 심정지 환자 지원 시스템의 설계 및 구현)

  • Jang, Jin-Soo;Lee, Seo-Joon;Lee, Kwang-In;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.227-238
    • /
    • 2017
  • Cardiac arrest is a serious intensive emergency disease that causes death within less than several minutes by depriving the body and brain of blood supply. Survival rate of cardiac arrest patients outside of hospitals is especially low. This is because pedestrians usually do not perceive the patient as a sick person, also, even if they do so, they have no medical knowledge to properly react to such emergency. The purpose of this study is to propose a solution that uses widely spread smart phones to alert pedestrians of the cardiac arrest patient, prevents cardiac arrest, and provides first-aid measures. By applying the proposed solution, cardiac arrest can be prevented in advance, pedestrians can be alerted to keep the golden time(4 minutes), and first witness can quickly proceed with CPR, ultimately enhancing the survival rate of the cardiac arrest patient.

Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm (CIOS 몽고메리 모듈러 곱셈 알고리즘 기반 Scalable RSA 공개키 암호 프로세서)

  • Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.100-108
    • /
    • 2018
  • This paper describes a design of scalable RSA public-key cryptography processor supporting four key lengths of 512/1,024/2,048/3,072 bits. The modular multiplier that is a core arithmetic block for RSA crypto-system was designed with 32-bit datapath, which is based on the CIOS (Coarsely Integrated Operand Scanning) Montgomery modular multiplication algorithm. The modular exponentiation was implemented by using L-R binary exponentiation algorithm. The scalable RSA crypto-processor was verified by FPGA implementation using Virtex-5 device, and it takes 456,051/3,496347/26,011,947/88,112,770 clock cycles for RSA computation for the key lengths of 512/1,024/2,048/3,072 bits. The RSA crypto-processor synthesized with a $0.18{\mu}m$ CMOS cell library occupies 10,672 gate equivalent (GE) and a memory bank of $6{\times}3,072$ bits. The estimated maximum clock frequency is 147 MHz, and the RSA decryption takes 3.1/23.8/177/599.4 msec for key lengths of 512/1,024/2,048/3,072 bits.

A TransGate System for Convenient Wireless Internet Contents Generation (편리한 무선인터넷 컨텐츠 생성을 위한 TransGate 시스템)

  • Ryu Dong-Yeop;Han Seung-Hyun;Lim Young-Whan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.37-52
    • /
    • 2006
  • A mobile device like ceil phone is the necessity of modern people, of ich con be easily connected to a wireless internet through such a mobile device. The demand for a wireless data communication is growing rapidly. However, agencies have not yet completed standardization of a markup language. Due to the development of the Mobile Device, agencies in this field have provided different data formats with each Mobile Device Platform. Traditionally, contents is hand-tailored to suit the target device. A key problem is that the characteristics and capabilities of the mobile device are too diverse to service the most suitable mobile contents. Because of these problems, the need for a re-usable document description language increases. In this paper, we defined Template file that is common data to service mobile devices. We proposed a method that could be an effective wireless web service though design and the implementation of the Call manager & the XSL Generator. In the methodology, when requesting a wireless internet service, a mobile device finds out markup language and a hardware specification of the mobile device through the Call Manager component supports. The XSL Generator component creates the XSL file dynamically that is the most suitable to a device. Finally, contents is serviced to each device by XSLT. It can generate a wireless page more easily by reusing the existing web contents through such course. Therefore, it can save the time and expense for generating a wireless page.

  • PDF

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.