• Title/Summary/Keyword: 인터넷데이터센터

Search Result 183, Processing Time 0.029 seconds

Smart Device based ECG Sensing IoT Applications (스마트 디바이스 기반 ECG 감지 IoT 응용 서비스에 관한 연구)

  • Mariappan, Vinayagam;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.18-23
    • /
    • 2016
  • Internet of things (IoT) is revolutionizing in the patient-Centered medical monitoring and management by authorizing the Smartphone application and data analysis with medical centers. The network connectivity is basic requirement to collect the observed human beings' health information from Smartphone to monitor the health from IoT medical devices in personal healthcare. The IoT environment built in Smartphone is very effective and does not demand infrastructure. This paper presents the smart phone deployed personal IoT architecture for Non-Invasive ECG Capturing. The adaptable IoT medical device cum Gateway is used for personal healthcare with big data storage on cloud configuration. In this approach, the Smartphone camera based imaging technique used to extract the personal ECG waveform and forward it to the cloud based big data storage connectivity using IoT architecture. Elaborated algorithm allows for efficient ECG registration directly from face image captured from Smartphone or Tablet camera. The profound technique may have an exceptional value in monitoring personal healthcare after adequate enhancements are introduced.

Harvest and Providing System based on OAI for Science Technology Information (OAI 기반 과학기술정보 수집 제공 시스템)

  • Yoon, Jun-Weon
    • Journal of Information Management
    • /
    • v.38 no.1
    • /
    • pp.141-160
    • /
    • 2007
  • Many contents produced and provided as development of information technology on the internet. Especially discussion that collecting and storing of digital information resources, is expanded as growing dependence on academic information of research workers. Open Access is a new paradigm of information distribution that is opposite concept of high price distribution academic information. It is an OAI system that is intended to collect and automate open access data in good order. This paper constructs stOAI based on OAI that is a science and technology information providing system. This system provides international academic journal free of charge that collect and store through OAI protocol in OA(Open Access) of yesKISTI(science and technology information portal service). Also, It provides automate and centralize science technology information, that KISTI has, to external institution as a standard type.

The Design and Implementation of an Agent for Resolving the Problem of Redundant Input of Distributed Human Resources Information (산재된 인력정보의 중복입력 문제 해결을 위한 에이전트 설계 및 구현 방법에 관한 연구)

  • Shon, Kang-Ryul;Han, Hee-Jun;Lim, Jong-Tae
    • Journal of Information Management
    • /
    • v.38 no.1
    • /
    • pp.75-98
    • /
    • 2007
  • Each domain of web services increased in geometrical progression by remarkable growth of the Internet serves various services or functions, and earns an income. And all services are divided by individual goal in each domain. What counts is that we must offer a personal data, our human resource information to use web service in the majority of cases. Otherwise we have to act under constraint in using the many web services. In this paper, we analyze the database structure or schema for managing human resource information from several web sites or service demands, and propose an agent design and implementation method for preventing duplication input of personal human resource information and sharing the human resource data.

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

Location for a Car Crash and The Service System (차량 충돌 사고에 대한 위치 확인 및 서비스 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.381-388
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are becoming more diverse. In particular, where you recognize the location of objects such as people and things and to provide valuable services based on the ubiquitous and location-based services are emerging as an important service. The collision between the vehicle position measurement in this thesis and offers related service system. Used in the proposed system, the GPS PACKET with information about the location and time of collision for the vehicle crash, the vehicle consists of a NodeID. Cause a conflict between these data at the vehicle, the vehicle through the gateway from the server to decide whether to go on to determine that an emergency situation, Emergency Center, the location information and giving information about whether the conflict is measured. Also, for such an emergency, such as a family on the outside of the wireless terminal related to Wireless (PDA, Phone) is to let me know. The server to want to save the crash information to the database of configuration. Additionally, the proposed U-LBS system to verify the validity of the experiment was performed.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Building plan research of Smart Ammunition Logistics System based on the 4th industrial technology (4차산업혁명기술 기반 스마트 탄약물류체계 구축 방안 연구)

  • Choi, Jong-Geun;Kim, Byung-Kyoo;Chang, Yoon Seok
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.135-145
    • /
    • 2022
  • This paper presented a method to build a predictable smart ammunition logistics system using the 4th industrial technology for ammunition logistics, which is the core functions in the field of defense and logistics. We have analyzed the current level of ammunition logistics with various perspectives such as domestic and overseas logistics policies, technology trends, ammunition logistics characteristics, the smart logistics certification measures by Ministry of Land, Infrastructure and Transport. As a result it is considered that the current ammunition logistics needs needs improvement. To improve this, we presented a direction based on the implications derived after analyzing various ongoing programs such as wired/wireless-based automation, smart ammunition depots, and logistics innovation of the army, navy, and air force that can be applied to the ammunition logistics. In order to implement a data-based smart ammunition logistics management system that can achieve innovation and efficiency of total life cycle while meeting changes in the battlefield environment, we presented 4 objectives such as "automation and modernization of field work", "3D-based storage management & improvement of issuing at war," and "data management for prediction-oriented ammunition management". it is expected that there will be benefits such as improvement of operational continuity, guarantee of ammunition reliability, budget reduction, improvement of inefficiencies such as delay, waiting, and double work, and reduction of accidents.

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF