• Title/Summary/Keyword: embedded computing

Search Result 537, Processing Time 0.024 seconds

Ambulatory System for Context Awareness Using a Accelerometer Sensor (가속도센서를 이용한 상황인식 시스템)

  • Jin Gye-Hwan;Lee Sang-Bock;Choi Hun;Suh Jae-Won;Bae Hyeon-Deok;Lee Tae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.287-295
    • /
    • 2005
  • This paper describes user context awareness system, which is one of the most essential technologies in various application services of ubiquitous computing. The proposed system used two-akial accelerometer, embedded in SenseWear(R)PRO2 Armband (BodyMedia). When it was worn on the right upper arm of the experiment subjects, MAD (mean of absolute difference) value of the sensor data was calculated to quantify the amount of the wear's activity. Using this data, PC-based fuzzy inference system was realized to distinguish human motion states, such as, lying, sitting, walking and running and to recognize the restricted emergency situations. In laboratory experiment, the amount of activities for tying, sitting, walking and running were 0.204 g/s, 0.373 g/s, 2.808 g/s and 16.243 g/s respectively. The recognition rates of human motion states were 96.7 %, 93.0 %, 95.2 % and 98.4 % respectively for lying, sitting, walking and running. The recognition rate of restricted emergency situation was 100%.

  • PDF

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Design and Evaluation of a Fast Boot-up Technique for Flash Memory based Computer Systems (플래시메모리 기반 컴퓨터시스템을 위한 고속 부팅 기법의 설계 및 성능평가)

  • Yim, Keun-Soo;Kim, Ji-Hong;Koh, Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.587-597
    • /
    • 2005
  • Flash memory based embedded computing systems are becoming increasingly prevalent.These systems typically have to provide an instant start-up time. However, we observe that mounting a file system toy flash memory takes 1 to 25 seconds mainly depending on the flash capacity. Since the flash chip capacity is doubled in every year, this mounting time will soon become the most dominant reason of the delay of system start-up time Therefore, in this paper, we present instant mounting techniques for flash file systems by storing the In-memory file system metadata to flash memory when unmounting the file system and reloading the stored metadata quickly when mounting the file system. These metadata snapshot techniques are specifically developed for NOR- and NAND-type flash memories, while at the same time, overcoming their physical constraints. The proposed techniques check the validity of the stored snapshot and use the proposed fast trash recovery techniques when the snapshot is Invalid. Based on the experimental results, the proposed techniques can reduce the flash mounting time by about two orders of magnitude over the existing de facto standard flash file system, JFFS2.

TMCS : Tangible Media Control System (감각형 미디어 제어 시스템)

  • 오세진;장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1356-1363
    • /
    • 2004
  • We propose Tangible Media Control System (TMCS), which allows users to manipulate media contents with physical objects in an intuitive way. Currently, most people access digital media contents by exploiting GUI. However, It provides limited manipulations of the media contents. The proposed system, instead of mouse and keyboard, adopts two types of tangible objects, i.e RFID-enabled object and tracker-embedded object. The TMCS enables users to easily access and control digital media contents with the tangible objects. In addition, it supports an interactive media controller which users can synthesize media contents and generate new media contents according to users' taste. It also offers personalized contents, which is suitable for users' preferences, by exploiting context such as user's profile and situational information. Therefore. the proposed system can be applied to various interactive applications such as multimedia education, entertainment and multimedia editor.

Block Associativity Limit Scheme for Efficient Flash Translation Layer (효율적인 플래시 변환 계층을 위한 블록 연관성 제한 기법)

  • Ok, Dong-Seok;Lee, Tae-Hoon;Chung, Ki-Dong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.673-677
    • /
    • 2010
  • Recently, NAND flash memory has been widely used in embedded systems, personal computers, and server systems because of its attractive features, such as non-volatility, fast access speed, shock resistance, and low power consumption. Due to its hardware characteristics, specifically its 'erase-before-write' feature, Flash Translation Layer is required for using flash memory like hard disk drive. Many FTL schemes have been proposed, but conventional FTL schemes have problems such as block thrashing and block associativity problem. The KAST scheme tried to solve these problems by limiting the number of associations between data block and log block to K. But it has also block thrashing problem in random access I/O pattern. In this paper, we proposed a new FTL scheme, UDA-LBAST. Like KAST, the proposed scheme also limits the log block association, but does not limit data block association. So we could minimize the cost of merge operations, and reduce merge costs by using a new block reclaim scheme, log block garbage collection.

A Secure Deletion Method for NAND Flash File System (NAND 플래시 파일 시스템을 위한 안전 삭제 기법)

  • Lee, Jae-Heung;Oh, Jin-Ha;Kim, Seok-Hyun;Yi, Sang-Ho;Heo, Jun-Young;Cho, Yoo-Kun;Hong, Ji-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.251-255
    • /
    • 2008
  • In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require that deleted files no longer be accessible. This requirement is more important in embedded systems that employ flash memory as a storage medium. In this paper, we propose a secure deletion method for NAND flash file system and apply the method to YAFFS. Our method uses encryption to delete files and forces all keys of a specific file to be stored in the same block. Therefore, only one erase operation is required to securely delete a file. Our simulation results show that the amortized number of block erases is smaller than the simple encryption method. Even though we apply our method only to the YAFFS, our method can be easily applied to other NAND flash file systems.

A Communication Platform for Mobile Group Peer-to-Peer Services (모바일 그룹 P2P 응용 서비스를 위한 통신 플랫폼)

  • Song, Ji-Hwan;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.389-400
    • /
    • 2008
  • As the wireless network technologies and the capability of the mobile terminals are evolving, advanced peer to peer applications for mobile users are attracting interests. In this paper, we propose the mobile P2P communication platform(MPCP) which provides transparency to the wireless network technologies and solutions to the limited resources of the mobile terminals. MPCP classifies the connection into two levels: a virtual channel and a session. A virtual channel is the network layer connection between the terminals whereas a session is the application layer connection. MPCP classifies the sessions into four types and applies different scheduling priority and data processing policies such as segmentation and reassembly. It selects proper wireless network technologies depending on the distance between the communication endpoints. To acquire dynamically changed access address, we harness the Session Initiation Protocol. We implemented MPCP on embedded Linux simulator and utilized the implementation in mobile P2P service development. For the quantitative analysis, we compared the performance of MPCP with that of ftp. Regardless of the number of simultaneous sessions, MPCP maintains the relative performance.

System Design of 900MHz RFID Eucational System including the Active Tag (능동형 태그를 포함한 900MHz RFID 교육용 시스템의 설계)

  • Kim, H.C.;Ohlzahas, A.;Kim, J.M.;Jin, H.S.;Cho, D.G.;Chung, J.S.;Kang, O.H.;Jung, K.W.
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.51-59
    • /
    • 2007
  • This paper presents the development of RFID educational system based on using 900MHz air interface between the reader and the active tag. The software of reader and the active tag is developed on embedded environment, and the software of PC controlling the reader is based on window OS operated as the server. The AT89C51ED2 VLSI chip is used for the processor of the reader and the active tag. As the development environment, Keil compiler is used for the reader and the active tag of which the programing language is C. The visual C language of the visual studio on the PC activated as the server is used for development language. To verify the function of the system, PC gets the tag's identification number through the reader and send the data to with the active tag memory a certain contents as "wite" operation. Finally the data written from the active tag's memory is sent to the PC via the reader as "read" operation and compare the received data with one already sent to the tag.

  • PDF

An App Visualization design based on IoT Self-diagnosis Micro Control Unit for car accident prevention

  • Jeong, YiNa;Jeong, EunHee;Lee, ByungKwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1005-1018
    • /
    • 2017
  • This paper proposes an App Visualization (AppV) based on IoT Self-diagnosis Micro Control Unit (ISMCU) for accident prevention. It collects a current status of a vehicle through a sensor, visualizes it on a smart phone and prevents vehicles from accident. The AppV consists of 5 components. First, a Sensor Layer (SL) judges noxious gas from a current vehicle and a driver's driving habit by collecting data from various sensors such as an Accelerator Position Sensor, an O2 sensor, an Oil Pressure Sensor, etc. and computing the concentration of the CO collected by a semiconductor gas sensor. Second, a Wireless Sensor Communication Layer (WSCL) supports Zigbee, Wi-Fi, and Bluetooth protocol so that it may transfer the sensor data collected in the SL to ISMCU and the data in the ISMCU to a Mobile. Third, an ISMCU integrates the transferred sensor information and transfers the integrated result to a Mobile. Fourth, a Mobile App Block Programming Tool (MABPT) is an independent App generation tool that changes to visual data just the vehicle information which drivers want from a smart phone. Fifth, an Embedded Module (EM) records the data collected through a Smart Phone real time in a Cloud Server. Therefore, because the AppV checks a vehicle' fault and bad driving habits that are not known from sensors and performs self-diagnosis through a mobile, it can reduce time and cost spending on accidents caused by a vehicle's fault and noxious gas emitted to the outside.

An Electronic System in Automatic Refracto-Keratometer (자동 시각 굴절력 곡률계의 전자 부문 시스템)

  • Seong, Won;Ryu, Gang-Min;Park, Jong-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.669-678
    • /
    • 2002
  • Currently, the domestic interests on the development of eyesight related measuring instruments are being increased. So we are developing such an electronic system of Refracto-keratometer, which contains a software and a hardware both. If this system could inform the examiner of the precise eyesight measuring result from the treatment of the image of optical system, then potentially the number of missed measuring results could be reduced. Our electronic system has been developed from the two areas divided into a software and a hardware. The software area was focused on the more exact eyesight measuring results, using morphological filtering methods and gray-leveled signal enhancing techniques. The hardware area is performing the same functions as the existing other systems. Besides, it provides the embedded software with free variables which could reduce the developing duration sharply as well as enlarge many kinds of application-extensions. Therefore, this electronic system has made effective eyesight measurement possible as the result of reducing the differences applied to sophisticated eyesight measurement.