• Title/Summary/Keyword: communication devices

Search Result 4,042, Processing Time 0.034 seconds

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

Design the generation process of software quantitative evaluation index using ISO/IEC 25023 (ISO/IEC 25023을 활용한 소프트웨어의 정량적 평가지표 생성 프로세스 설계)

  • Kim, Suwook;Lee, Jongmin;Park, Yoohyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.508-515
    • /
    • 2019
  • Although various quantitative indexes are used as criteria for deciding the success of software R & D projects, it is somewhat difficult to find which quantitative indexes are appropriate. In this paper, we propose a quantitative evaluation index generation process for software product development using ISO / IEC25023, which is used as a standard of software quality level, to provide criteria for quantitative evaluation index of software development. The proposed process consists of two stages. In the first step, quality characteristics and subcharacteristics of ISO / IEC25023 standard specification are derived and in the second stage, we derive an evaluation indicator guides that matches the quality characteristics and sub characteristics. The proposed quantitative evaluation index generation process is expected to be helpful for the selection of quantitative evaluation indexes according to the characteristics of software development projects.

IEC 61850 Based IoT Gateway Platform for Interworking to Microgrid Operational System (마이크로그리드 운영 시스템 연계를 위한 IEC 61850 기반 IoT 게이트웨이 플랫폼)

  • Park, Jeewon;Song, ByungKwen;Shin, InJae
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.67-73
    • /
    • 2018
  • There are many types of power facilities such as transformers, switches, and energy storage devices in the micro grid environment. However, with the development of IoT technology, opportunities to acquire sensor information such as temperature, pressure, and humidity are provided. In the existing micro grid environment, the communication protocols such as MMS transport protocol in IEC 61850 standard is applied in accordance with the integrated operation between the power facilities and the platform. Therefore, to accommodate IoT data, a gateway technology that can link IoT data to a data collection device (FEP) based on IEC 61850 is required. In this paper, we propose IEC 61850 based IoT gateway platform prototype for microgrid operating system linkage. The gateway platform consists of an IoT protocol interface module (MQTT, CoAP, AMQP) and database, IEC 61850 server. For databases, We used open source based NoSQL databases, Hbase and MongoDB, to store JSON data. We verified the interoperability between the IoT protocol and the IEC 61850 protocol using Sisco's MMS EASY Lite.

A study on Customized Foreign Language Learning Contents Construction (사용자 맞춤형 외국어학습 콘텐츠 구성을 위한 연구)

  • Kim, Gui-Jung;Yi, Jae-Il
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.189-194
    • /
    • 2019
  • This paper is a study on the methodology of making customized contents according to user 's tendency through the development of learning contents utilizing IT. A variety of learners around the world use mobile devices and mobile learning contents to conduct their learning activities in various fields, and foreign language learning is one of the typical mobile learning areas. Foreign language learning contents suggested in this study is constructed based on the learner's verbal and text information in accordance with the user's vocal tendency. It is necessary to find out a suitable method to translate the user's native language text into the target language and make it into user friendly content.

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

One-stop Platform for Verification of ICT-based environmental monitoring sensor data (ICT 기반 환경모니터링 센서 데이터 검증을 위한 원스탑 플랫폼)

  • Chae, Minah;Cho, Jae Hyuk
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.32-39
    • /
    • 2021
  • Existing environmental measuring devices mainly focus on electromagnetic wave and eco-friendly product certification and durability test, and sensor reliability verification and verification of measurement data are conducted mainly through sensor performance evaluation through type approval and registration, acceptance test, initial calibration, and periodic test. This platform has established an ICT-based environmental monitoring sensor reliability verification system that supports not only performance evaluation for each target sensor, but also a verification system for sensor data reliability. A sensor board to collect sensor data for environmental information was produced, and a sensor and data reliability evaluation and verification service system was standardized. In addition, to evaluate and verify the reliability of sensor data based on ICT, a sensor data platform monitoring prototype using LoRa communication was produced, and the test was conducted in smart cities. To analyze the data received through the system, an optimization algorithm was developed using machine learning. Through this, a sensor big data analysis system is established for reliability verification, and the foundation for an integrated evaluation and verification system is provide.

A study on Design of Casual wear utilizing 3D Virtual Clothing Technology - focus on Generation Z (3D 가상 의상 기술을 활용한 캐쥬얼웨어 디자인 연구 - Z 세대를 중심으로)

  • Shin, Hae Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.75-81
    • /
    • 2021
  • With the development of advanced information and communication technology, Generation Z, familiar with digital culture, is drawing keen attention as a major consumer of the fashion industry. In this study, casual wear for Generation Z, who is proficient in digital devices and prefers information acquisition and lifestyle over the Internet, was designed using 3D virtual simulation and developed into four looks: Gulish, Sportive, Easy and Contemporary. The use of simulation of 3D virtual clothing in costume design can build digitalization of future fashion industry through convergence with digital fashion design planning and production process in fandemic environment and strengthen online platform distribution. In a business environment that continues to innovate to enhance work efficiency by introducing an Untouch fashion production system, the use of 3D virtual clothing technology can increase the efficiency of sustainable management through 3D sample production, online fitting, modification, and final critic processes to reduce the time and cost of human and physical resources and review.

Switched SRAM-Based Physical Unclonable Function with Multiple Challenge to Response Pairs (스위칭 회로를 이용한 다수의 입출력 쌍을 갖는 SRAM 기반 물리적 복제 불가능 보안회로)

  • Baek, Seungbum;Hong, Jong-Phil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1037-1043
    • /
    • 2020
  • This paper presents a new Physical Unclonable Function (PUF) security chip based on a low-cost, small-area, and low-power semiconductor process for IoT devices. The proposed security circuit has multiple challenge-to-response pairs (CRP) by adding the switching circuit to the cross-coupled path between two inverters of the SRAM structure and applying the challenge input. As a result, the proposed structure has multiple CRPs while maintaining the advantages of fast operating speed and small area per bit of the conventional SRAM based PUF security chip. In order to verify the performance, the proposed switched SRAM based PUF security chip with a core area of 0.095㎟ was implemented in a 180nm CMOS process. The measurement results of the implemented PUF show 4096-bit number of CRPs, intra-chip Hamming Distance (HD) of 0, and inter-chip HD of 0.4052.

The Development of Electromagnetic pulse Protection Capability in the Main System of a Tank Battalion (전차대대 주요체계의 EMP 방호능력 발전방안에 관한 연구)

  • Choi, Hokab;Han, Jaeduk;Son, Sangwoo;Kim, Sungkon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.623-631
    • /
    • 2020
  • An electromagnetic pulse (EMP) attack on a nuclear weapon or the airlift of an electronic bomb affects weapons systems, information devices, wired and wireless communication equipment, and power supply equipment. It can lead to confusion on the battlefield. The current standards for EMP protection when applied to the military are centered on fixed and mobile facilities and equipment. It is, however, important to study EMP protection for a single tactical unit centered on the weapon system. In this study, EMP protection standards were established for command and control, maneuvering and firepower systems vulnerable to EMPs, focusing on battle tanks with mobility, firepower, and shock force. Also, specific development plans for EMP protection capabilities are proposed, including the shielding and blocking of EMPs. Through the study, the Korean government intends to ensure a unit's command and control under an EMP attack as well as preserve the viability of a unit's personnel and guarantee the conditions for the execution of a mission.

Implementation of User Recommendation System based on Video Contents Story Analysis and Viewing Pattern Analysis (영상 스토리 분석과 시청 패턴 분석 기반의 추천 시스템 구현)

  • Lee, Hyoun-Sup;Kim, Minyoung;Lee, Ji-Hoon;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1567-1573
    • /
    • 2020
  • The development of Internet technology has brought the era of one-man media. An individual produces content on user own and uploads it to related online services, and many users watch the content of online services using devices that allow them to use the Internet. Currently, most users find and watch content they want through search functions provided by existing online services. These features are provided based on information entered by the user who uploaded the content. In an environment where content needs to be retrieved based on these limited word data, user unwanted information is presented to users in the search results. To solve this problem, in this paper, the system actively analyzes the video in the online service, and presents a way to extract and reflect the characteristics held by the video. The research was conducted to extract morphemes based on the story content based on the voice data of a video and analyze them with big data technology.