• Title/Summary/Keyword: device-to-device verification

Search Result 481, Processing Time 0.025 seconds

Face Detection based on Matched Filtering with Mobile Device (모바일 기기를 이용한 정합필터 기반의 얼굴 검출)

  • Yeom, Seok-Won;Lee, Dong-Su
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.76-79
    • /
    • 2014
  • Face recognition is very challenging because of the unexpected changes of pose, expression, and illumination. Facial detection in the mobile environments has additional difficulty since the computational resources are very limited. This paper discusses face detection based on frequency domain matched filtering in the mobile environments. Face detection is performed by a linear or phase-only matched filter and sequential verification stages. The candidate window regions are selected by a number of peaks of the matched filtering outputs. The sequential stages comprise a skin-color test and an edge mask filtering tests, which aim to remove false alarms among selected candidate windows. The algorithms are built with JAVA language on the mobile device operated by the Android platform. The simulation and experimental results show that real-time face detection can be performed successfully in the mobile environments.

On-site Investigation and Verification of Effect of the Sea Urchin Removal Devices (전기장 자극을 활용한 성게제거장치의 해상성능 평가)

  • Kim, Dae-Jin;Lee, Jungkwan;Kim, Seonghun;Oh, Wooseok;Oh, Taegeon;Lee, Donggil;Lee, Kyounghoon
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.53 no.6
    • /
    • pp.954-959
    • /
    • 2020
  • This study aimed to verify the effectiveness of rescue apparatus, that can capture crabs using external stimuli such as food and electricity, without relying on divers. In this study, a microcomputer-based controller and an IC-device-based controller were developed, and spot inspection was conducted using 20 modules and 30 sea urchin removal modules. Accordingly, 58, 18, 17, and 74 sea urchins were introduced in the first, second, third and fourth experiments, respectively. The result of evaluating the lure of each removal mechanism, based on the catch per unit effort, with an electrical stimulus was 1.1 (32/10), with a feeding stimulus was 3.4 (100/29), and with electrical and feeding stimuli was 3.5 (35/10).

Design and Hardware Verification of Power Conversion System for GaN-HEMT Based Anyplace Induction Cooktop (GaN-HEMT 기반 Anyplace Induction Cooktop용 전력변환장치 설계 및 성능 검증)

  • Kwon, Man-Jae;Jang, Eun-Su;Park, Sang-Min;Lee, Byoung-Kuk
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.25 no.6
    • /
    • pp.451-458
    • /
    • 2020
  • In this study, a trade-off analysis of a power conversion system (PCS) is performed in accordance with a power semiconductor device to establish the suitable operating frequency range for the anyplace induction heating system. A resonant network is designed under each operating frequency condition to compare and analyze the PCS losses depending on the power semiconductor device. On the basis of the simulation results, the PCS losses and frequency condition are calculated. The calculated results are then used for a trade-off analysis between Si-MOSFET and GaN-HEMT based on PCS. The suitable operating frequency range is determined, and the validity of the analysis results is verified by the experiment results.

A Secure Yoking-Proof Protocol Providing Offline Verification (오프라인 검증을 지원하는 안전한 요킹증명 프로토콜)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.

A Behavior Test on a Frictional-Wedge-Type Vibration Isolation Device for Vibration Reduction of a Railway Track (열차 진동 저감을 위한 마찰쐐기형 방진장치의 거동 시험)

  • Lee, Chanyoung;Choi, Sanghyun;Lee, Yooin;Kwon, Segon;Koh, Yongsung;Ji, Yongsoo
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.45-54
    • /
    • 2015
  • In the case of railway facilities in cities such as a railway station or a bridge, the significance of design for reducing vibration and noise is getting more significant. The vibration control solution is in need especially for an elevated railway station to block vibration of a train and secondary noise effectively. Even though a vertical vibration isolation device is able to be applied effectively to railway facilities such as elevated railway stations which transfer vibration directly from a train to a structure, the development of the vertical device is much slower than a horizontal vibration isolation device. In this paper, a vibration isolation device using wedge type friction material which is currently developing to reduce train-induced vibration effectively is introduced and test results for verification of dynamic performance is also presented. The vibration test on a concrete structure equipped with the developed vibration isolation device is conducted through which the isolation performance and dynamic properties are verified and needs for improving the performance of the device is identified.

Design for Automatic Building of a Device Database and Device Identification Algorithm in Power Management System (전력 관리 시스템의 장치 데이터베이스 자동 구축 및 장치 식별 알고리즘 설계)

  • Hong, Sukil;Choi, Kwang-Soon;Hong, Jiman
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.4
    • /
    • pp.403-411
    • /
    • 2014
  • In this paper, an algorithm of extracting the features of home appliances and automatically building a database to identify home appliances is designed and presented. For the verification, a software library supporting this algorithm is implemented and added to an power management system server, which was already implemented to support real-time monitoring of home appliances' power consumption status and controlling their power. The implemented system consists of a system server and clients, each of which measures the power consumed by a home appliance plugged in it and transmits the information to the server in real-time over a wireless network. Through experiments, it is verified that it is possible to identify any home appliance connected to a specific client.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

A Study and Application of Methodology for Applying Simulation to Car Body Assembly Line using Logical Model (Logical 모델을 활용한 자동차 차체 조립 라인의 시뮬레이션 적용을 위한 방안 연구 및 적용)

  • Koo, Lock-Jo;Park, Snag-Chul;Wang, Gi-Nam
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.4
    • /
    • pp.225-233
    • /
    • 2009
  • The objective of this paper is to examine a construction method and verify PLC logic using the logical modeling and simulation of a virtual plant has complex manufacturing system and the domain of application is car body assembly line of automotive industrial operated by PLC Program. The proposed virtual plant model for the analysis of the construction method consists of three types of components which are virtual device, intermediary transfer and controller is modeled by logical model but it the case of the verification of PLC program, HMI and PLC logic in the field substitute for the controller. The implementation of the proposed virtual plant model is conducted PLC Studio which is an object-oriented modeling language based on logical model. As a result, proposed methods enable 3D graphics is designed in the analysis step to use for verification of PLC program without special efforts.

A Study on the Analysis and Verification of Evaluation system for the Usability Evaluation of Purpose-Based XR Devices (목적 기반 XR 디바이스의 사용성 평가를 위한 평가체계 분석 및 검증 연구)

  • Young Woo Cha;Gi Hyun Lee;Chang Kee Lee;Sang Bong Lee;Ohung Kwon;Chang Gyu Lee;Joo Yeoun Lee;JungMin Yun
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.spc1
    • /
    • pp.56-64
    • /
    • 2024
  • This study aims to compare and evaluate the usability of domestic and overseas XR devices. With the recent release of 'Apple Vision Pro', interest in the XR field is increasing rapidly. XR devices are being used in various fields such as defense, medical care, education, and entertainment, but the evaluation system for evaluating usability is still insufficient. Therefore, this study aims to derive improvements in domestic equipment through comparative evaluation of usability for two HMD-type devices and one glasses-type device that are released. In order to conduct the study, 20 participants in their 20s to 30s who were interested in XR devices and had no visual sensory organ-related disabilities were evaluated by wearing VR equipment. As a quantitative evaluation, electromyography through an EMG sensor and the device and body temperature of the device through a thermal imaging camera were measured. As a qualitative evaluation, the safety of wearing, ease of wearing, comfort of wearing, and satisfaction of wearing were evaluated. As a result of comparing the usability of the devices based on the results, it was confirmed that domestic HMD-type device needs improvement in the strap part.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF