• Title/Summary/Keyword: 스마트 디스크

Search Result 45, Processing Time 0.024 seconds

Implementation of Turtle Neck Syndrome Diagnosis using CNN (CNN을 이용한 거북목 증후군 진단기의 구현)

  • Son, Dong-Hyeop;Jung, Yuchul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.7-10
    • /
    • 2021
  • 최근 스마트폰과 컴퓨터 등의 비중이 커지면서 거북목 증후군의 관심사가 커졌다. 거북목 증후군은 잘못된 자세로 인해 어깨의 근육과 인대가 늘어나 통증이 생기는 증상을 의미한다. 이러한 잘못된 자세에는 대표적으로 일자목과 역c자목이 있으며 일자목은 7개의 목뼈로 이루어진 경추라인이 c자 라인에서 일직선으로 뼈의 형태가 바뀌어 디스크가 일어나 통증을 유발하는 증상이고 역c자목은 정상의 목뼈 구조를 잃어버린 형태로 곧 디스크를 보이며 고개를 드는 것이 힘드며 구부정한 자세를 취하게 되는 증상이다. 본 연구에서는 컨볼루션 신경망 (CNN) 학습 모델을 구현하여 주어진 자세가 올바른 자세인지 일자목인지 c자목인지를 진단할 수 있는 분류기를 구현하였다. 또한, 최근 코로나 사태로 인해 마스크 장착이 일상화되고 있는데, 추가 데이터를 보강하여, 마스크 착용상태에서도 적용가능한 모델로 확장하였다.

  • PDF

Compound Backup Technique using Hot-Cold Data Classification in the Distributed Memory System (분산메모리시스템에서의 핫콜드 데이터 분류를 이용한 복합 백업 기법)

  • Kim, Woo Chur;Min, Dong Hee;Hong, Ji Man
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.16-23
    • /
    • 2015
  • As the IT technology advances, data processing system is required to handle and process large amounts of data. However, the existing On-Disk system has limit to process data which increase rapidly. For that reason, the In-Memory system is being used which saves and manages data on the fast memory not saving data into hard disk. Although it has fast processing capability, it is necessary to use the fault tolerance techniques in the In-Memory system because it has a risk of data loss due to volatility which is one of the memory characteristics. These fault tolerance techniques lead to performance degradation of In-Memory system. In this paper, we classify the data into Hot and Cold data in consideration of the data usage characteristics in the In-Memory system and propose compound backup technique to ensure data persistence. The proposed technique increases the persistence and improves performance degradation.

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

FastIO: High Speed Launching of Smart TV Apps (FastIO: 스마트 TV 앱의 고속 구동 기법)

  • Lee, Cheolhee;Hwang, Taeho;Won, Youjip;Lee, Seongjin
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.725-735
    • /
    • 2016
  • Smart TV uses Webkit as a web browser engine to provide contents such as web surfing, VOD watching, and games. Webkit uses web resources, such as HTML, CSS, JavaScript, and images, in order to run applications. At the start of an application, Webkit loads resources to the memory and creates DOM tree and render tree, which is a time consuming process. However, DOM tree and render tree created by the smart TV application do not change over time because the smart TV application uses web resources stored in a disk. If DOM tree and render tree can be stored and reused, it is possible to reduce loading time of an application. In this paper, we propose FastIO technique that selectively adds persistency to dynamically allocated memory. FastIO reduces overall application loading time by eliminating the process of loading resources from storage, parsing the HTML documents, and creating DOM tree and render tree. Comparison of the application resource loading times indicates that the web browser with FastIO is 7.9x, 44.8x, and 2.9x faster than the legacy web browser in an SSD, Ramdisk, and eMMC environment, respectively.

The Development of a Behavioral Assessments and QR Code Based Mobile Web Application for Classroom (성격유형검사와 QR코드 기반의 모바일 학급 웹앱 개발)

  • Yoo, InHwan
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.4
    • /
    • pp.397-407
    • /
    • 2012
  • According to the fast supply of the SMART device, many people have a lot of interests about SMART education. The Korean government is showing a lot of effort towards the promotion of SMART education. In this study, I developed a behavioral assessments and QR code based mobile web application for school education. The developed system works seamlessly across all popular mobile device platforms and if you save the data after the assessment, this system will automatically create each person's mobile web page. Students and teachers can add comments to this page and can improve the accessibility for finding the address of this page to QR code. The developed system can contribute to the class members understanding the personality of each other and make communication run smoothly. As a result of application of developed system, it is expected to contribute to increasing the interaction between a students, parents and teachers because the developed system provides a service based to education consumer's TPO(Time, Place, Occasion).

  • PDF

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting (IPTV환경에서 스마트카드와 셋톱박스간의 안전한 통신을 위한 경량화된 키 동의 프로토콜)

  • Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.67-78
    • /
    • 2010
  • CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing the contents in IPTV broadcasting environment. In the CAS, Smartcard transfers CW which is necessary in the process of descrambling the scrambled program to STB. CW hacking problem is one of the most serious problems in pay-TV system. There have been many researches on generating secure communication channel between smartcard and STB for secure transmitting, But they had problems in efficiency and security. In this paper, we propose a lightweight key agreement protocol based on a symmetric key algorithm. We show that our proposed protocol is more efficient than existing protocols by comparing the amount of computations, and analyzing the security requirement of the proposed protocol.

Design and Implementation of A Certificate and Key Management System based on the WEB (웹기반 인증서 및 키관리 시스템의 설계 및 구현)

  • 박윤주;문창주;박대하;백두권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.336-338
    • /
    • 1999
  • 전자상거래에 대한 요구가 급증하고 있는 오늘날, 상대방의 신뢰성을 보증해 주는 인증서 사용이 빈번해지고 있다. 기존에는 인증기관이 발급한 인증서를 사용자가 보관하다가, 전자상거래를 할 경우 이를 전자서명과 함께 상대방에게 제시하여 서로의 신뢰성을 확인하였지만, 이 방법은 사용자가 인증서와 비밀키를 자신의 하드웨어 디스크에 보관하거나, 스마트 카드 또는 플로피디스켓에 휴대하고 다녀야 하는 번거로움이 있었다. 사용자의 이동이 많아지고, 사용자가 자신의 위치나 하드웨어 플렛폼에 상관없이 전자상거래를 하고자 하는 요구가 증대됨에 따라서, 인증서와 비밀키를 휴대해야 하는 불편함은 커다란 제약점이라고 할 수 있다. 본 논문에서는 이러한 문제를 극복하고, 사용자가 어느 곳에서든지 웹브라우져를 사용하여 쉽게 인증서와 비밀키를 사용할 수 있도록 하는 웹기반 인증성 및 키과리 시스템의 설계와 구현방법을 제안한다. 제안된 시스템은 사용자가 복잡한 패스워드를 기억하지 못한다는 점과 패스워드가 쉽게 노출될 수 있다는 점을 고려하여 SPEKE에서 제시한 방법을 활용하여 로그인하였고, 시스템에 외부인이 침입할 경우에 대비하여 데이터베이스 안의 중요한 정보들은 암호화하여 저장하도록 하였으며, SSL이 설정되지 않았을 경우에도 안전하게 인증서를 위탁할 수 있도록 사용자와 인증서 관리 시스템은 정보를 암호화하여 통신하도록 한다.

  • PDF

A Private Key Roaming Protocol for Roaming Services (로밍 서비스를 위한 개인키 로밍 프로토콜)

  • 문성원;김영갑;박대하;문창주;백두권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.724-726
    • /
    • 2003
  • ‘키로밍(Key Roaming)’서비스는 임의의 단말기에서 인증서, 전자서명 둥의 사용자의 비밀정보를 네트워크를 통해서 접근할 수 있는 기능을 지원한다. 현재 은행의 뱅킹 시스템이나 그 밖의 인터넷 서비스에서는 비밀정보를 사용자의 컴퓨터에 저장해서 사용한다. 그러나 사용자가 그 비밀정보를 다른 컴퓨터에서 사용하고자 할 때에는 디스크나 스마트카드와 같은 보조기억장치에 저장해야 하는 불편함이 존재한다. 종래의 이러한 방식은 사용이 불편할 뿐만 아니라 공간과 비용치 부담이 크므로 키로밍 프로토콜에 대한 요구가 더욱 증대하였다. 키로밍 프로토콜은 공간과 비용의 절감이라는 효과가 있지만 해결해야 할 보안상의 문제가 존재하며 이 문제점들을 해결하기 위한 많은 방법들이 제시되어 왔다. 본 논문에서는 베리사인의 프로토콜과 한국정보 보호센타에서 제시한 다중서버를 이용하는 프로토콜에 대해서 살펴본 후 그 문제점을 지적하고 이를 해결 할 수 있는 새로운 프로토콜을 제안한다.

  • PDF