• Title/Summary/Keyword: firmware

Search Result 238, Processing Time 0.036 seconds

The Design of Multiplexing Data Acquisition System for Multi Channel Bio-magnetic Signal (다채널 생채 자기 신호의 다중 데이터 획득 시스템 설계)

  • Chang, Won-Suk;Jeon, Chang-Ik;Huh, Young;Jin, Seung-Oh;Kim, Ki-Uk;Lee, Hyun-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.515-518
    • /
    • 2003
  • The electrical current generated by heart creates not only electric potential but also a magnetic field. In this paper, we have designed the multiplexing data acquisition system for multichannel bio-magnetic signal measurement. The system consists of VXI rack which is organized MUX and AD board, Industrial rack which is mounted single board computer and DSP board. This system enable to realtime monitoring of multichannel data simultaneously. The number of channel could be increased simply added each module and firmware could be upgraded easily using host port interface of DSP.

  • PDF

Nymi Band firmware attack scenarios and countermeasures research (Nymi Band 펌웨어 공격 시나리오 및 대응방안 연구)

  • Hur, Yun-A;Shin, Young-Hyun;Lee, Kwang-Jae;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.733-734
    • /
    • 2015
  • 사용자 인증의 중요성이 강조되고 있는 추세에 따라 지문인식, 홍채인식, 안면 인식 등 생체인증 기술이 적용되어 디바이스 보안성이 향상되고 있다. 이런 흐름에 맞춰 심장박동패턴을 이용하는 새로운 보안 기술이 선보여지고 있는 가운데 심전도(ECG)방식을 통해 사용자인증을 하는 Nymi Band라는 웨어러블이 관심을 받고 있다. 그러나 해당 디바이스의 펌웨어 조작 가능성이 보안 취약점으로 제시되어 본 논문에서는 Nymi Band의 핵심 기술 분석을 거쳐 펌웨어 공격의 구체적인 시나리오를 구상하고, 그에 따른 대응 방안을 제안하는 연구를 진행하고자 한다.

A Design and Implement of the Medical Nd:YAG Laser Firmware under in ZCC method

  • Kim, Whi-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.40.3-40
    • /
    • 2001
  • The pulsed Nd:YAG laser is the most commonly used type of solid-state laser in many fields. In material processing and medical treatment, the power density control of a laser beam Considered to be significant, which depends on the flashlamp current pulse width and pulse repetition rate. For general laser power supply to control the laser power density, the secondary of the power transformer is connected to the rectifier and filter capacitor. The output of a rectifier is applied to a switching element in the secondary of the transformer. So power supply is complicated and the loss of switching is considerably. In addition, according to increasing pulse repetition rate, charged energy of energy-storage capacitor bank is not transferred sufficiently to flashlamp, and laser output efficiency decreases. In this study, we have ...

  • PDF

Implementation of Real-Time Data Logging System for Radar Algorithm Analysis (레이다 알고리즘 분석을 위한 실시간 로깅 시스템 구현)

  • Jin, YoungSeok;Hyun, Eugin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.253-258
    • /
    • 2021
  • In this paper, we developed a hardware and software platform of the real-time data logging system to verify radar FEM (Front-end Module) and signal-processing algorithms. We developed a hardware platform based on FPGA (Field Programmable Gate Array) and DSP (Digital Signal Processor) and implemented firmware software to verify the various FEMs. Moreover, we designed PC based software platform to control radar logging parameters and save radar data. The developed platform was verified using 24 GHz multiple channel FMCW (Frequency Modulated Continuous Wave) in an environment of stationary and moving targets of chamber room.

Design and implementation of IoT based controllers and communication module interfaces for stand-alone solar system

  • Lee, Yon-Sik;Mun, Young-Chae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.129-135
    • /
    • 2019
  • This paper is part of research and development for stand-alone solar system without commercial power supply. It implements firmware of controller for operation of stand-alone solar system by applying IoT technology and also develops communication modules that allow multiple solar lamps to send and receive data through wireless network. The controller of the developed stand-alone solar system can effectively charge the power generated by the solar module, taking into account the battery's charge and discharge characteristics. It also has the advantage of attaching wireless communication modules to solar lamp posts to establish wireless communication networks without incurring communication costs. In addition, by establishing IoT gateway middleware platform for each installation site, it forms a foundation to operate multiple solar lamp posts into multiple clusters. And, it is expected that the data collected in each cluster will be used to enable configuration and control of operational information, thereby inducing convenience and efficiency of remote operation and management.

A Study on Human Behavior Classification using a Hidden Markov Model (은닉 마코프 모델을 이용한 행동 분류 연구)

  • Seo, Jeong-U;Oh, Hyeon-kyo;Cho, Seung-ho;Lee, Ho-Seok;Moon, Bong-hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1354-1357
    • /
    • 2013
  • 최근 다양한 센서들이 일상생활에 활용되어, 일정한 환경에서 사람의 행동을 분류하고 인식하기 위한 연구들이 활발하게 진행되고 있다. 본 연구에서는 2개의 진동센서 값과 1개의 적외선 센서 값을 은닉 마코프 모델에 적용하여 침대 위에 있는 사람의 3가지 행동유형-눕기, 뒤척임, 일어나기-을 분류하고자 한다. 3개 센서 값의 특징들을 기초로 은닉 마코프 모델에 학습시키고, 특징집합과 학습 데이터량을 변화시키면서 사람의 행동유형에 대한 인식 실험을 수행하였다. 특징 개수 혼합에 따른 인식률의 차이는 거의 없는 것으로 나타났으나, 학습 데이터량을 증가시켜 가면서 수행한 실험에서는 인식률이 평균 78.127%로 향상되는 성과를 거두었다.

Lesson learned: Target-based independent S/W verification and validation for CEDMCS (교훈: 목표지향 제어봉제어계통 독립 소프트웨어 확인 및 검증)

  • Lee, jayoung;Sohn, kwangyoung;Lee, sangseok;Lee, junku;Park, geunok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.932-933
    • /
    • 2013
  • 단순 부품부터 계통까지 기존의 아날로그 제품들이 최근 들어 펌 웨어(Firmware)와 고수준의 컴퓨터 언어로 구현된 응용 소프트웨어를 포함하는 디지털 설비로 바뀌고 있다. 따라서 어느 때 보다 소프트웨어의 확인 및 검증의 중요성이 대두되고 있으며, 이를 위해 학계뿐만 아니라 국제표준 기관에서 확인 및 검증을 위한 지침을 제시하고 있는 실정이다. 본 논문은 원자력발전소 출력을 제어하는 제어봉제어계통의 업그레이드와 관련하여 IEEE 1012 에 따라 수행된 독립 확인 및 검증 업무를 요약하고, 이를 통해 얻은 교훈을 기술한다.

A Study on Arduino Firmware Design for Test Case Extraction based on Use-Case Approach (Use-Case Approach 기반의 Test Case 추출을 위한 아두이노 펌웨어 설계 연구)

  • Jang, Woo-Sung;Park, Byung-Ho;Kim, R.Young-Chul;Park, Y.B.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1015-1018
    • /
    • 2013
  • 최근 임베디드 펌웨어를 객체 지향 어플리케이션과 함께 개발하는 경우가 증가하고 있다. 하지만 기존의 펌웨어는 절차적 설계를 기반으로 하기 때문에 어플리케이션과 다른 설계 기법이 필요하여 개발 비용과 테스트 비용이 증가한다. 그렇지만 아두이노를 사용하면 펌웨어를 객체 지향 설계가 가능하다. 본 논문은 객체지향 적용 펌웨어를 설계에 초점을 두고, Gary E.Mogyorodi의 Test Case 생성 방법을 적용하여, 실제 펌웨어를 시험을 하고자 한다. 이 방법이 가능하면 일반적인 펌웨어와 어플리케이션을 같은 방법으로 설계 및 테스트가 가능하다. 적용사례로써, 한백전자 HBE-SmartCAR의 펌웨어를 아두이노 기반으로 설계 및 추출된 Test Case 실행을 통해, 설계와 구현이 동일함을 검증이 가능하다.

Multi-Purpose Integrated Training Drone to Prevent Safety Accidents (안전사고방지를 위한 다목적 결속형 교육용 드론)

  • Son, Min-Woo;Ju, Yeong-Tae;Kim, Jong-Sil;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.145-150
    • /
    • 2021
  • Currently, as the interest in drones has increased and the use of drones has increased rapidly, the number of people trying to learn drones is increasing. However, drones are difficult to manipulate, and accidents are likely to occur if they are not learned accordingly, and drones are broken easily. In this study, we developed a multi-purpose drone that can bind the drone to a safety bar to prevent safety accidents and damage of the drone, and expand sensors and control devices through blocks.

A novel approach for analyzing the nuclear supply chain cyber-attack surface

  • Eggers, Shannon
    • Nuclear Engineering and Technology
    • /
    • v.53 no.3
    • /
    • pp.879-887
    • /
    • 2021
  • The nuclear supply chain attack surface is a large, complex network of interconnected stakeholders and activities. The global economy has widened and deepened the supply chain, resulting in larger numbers of geographically dispersed locations and increased difficulty ensuring the authenticity and security of critical digital assets. Although the nuclear industry has made significant strides in securing facilities from cyber-attacks, the supply chain remains vulnerable. This paper discusses supply chain threats and vulnerabilities that are often overlooked in nuclear cyber supply chain risk analysis. A novel supply chain cyber-attack surface diagram is provided to assist with enumeration of risks and to examine the complex issues surrounding the requirements for securing hardware, firmware, software, and system information throughout the entire supply chain lifecycle. This supply chain cyber-attack surface diagram provides a dashboard that security practitioners and researchers can use to identify gaps in current cyber supply chain practices and develop new risk-informed, cyber supply chain tools and processes.