• Title/Summary/Keyword: Computer Usage

Search Result 1,229, Processing Time 0.024 seconds

Efficient Usage of Wi-Fi Ad-hoc Network with 3G (3G와 Wi-Fi 애드혹 네트워크의 효율적인 사용)

  • Yoon, Ji-Hyun;Yoo, Myoung-Jin;Yoon, Mi-Sun;Yang, Sung-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.643-646
    • /
    • 2011
  • 스마트 폰의 보급과 함께, 무선 네트워크에서의 데이터 사용량이 급격하게 증가하고 있다. 이로 인해 발생하는 서버의 과부하와 그로 인한 속도 저하를 해결하기 위하여, 본 논문에서는 Wi-Fi 에드혹 네트워크를 이용한 통신을 3G 통신망에 효율적으로 접목하는 기법을 제안한다. 본 논문에서는 하나의 파일을 다수의 파일 블록으로 나누어 받는 방식을 이용하며, Wi-Fi 애드혹 네트워크를 이용해 주변에 있는 다른 이용자에게 파일 블록을 요청함과 동시에 자신이 가진 파일 블록 테이블을 다른 이용자에게 전달해주는 기법을 제안한다. 이를 이용하여 상대가 가지고 있을 것이라고 추측되는 파일 블록을 알아내어, 요청할 수 있다. 그 결과, 제안된 알고리즘이 3G와 Wi-Fi 에드혹 네트워크를 랜덤으로 이용하는 방법 대비 73%의 속도 향상과 43%의 3G 사용량 감소 효과를 보임을 확인할 수 있었다.

Privacy Enhancement and Secure Data Transmission Mechanism for Smart Grid System

  • Li, Shi;Choi, Kyung;Doh, Inshil;Chae, Ki-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1009-1011
    • /
    • 2011
  • With the growth of Smart Grid technologies, security and privacy will become the most important issues and more attention should be paid. There are some existing solutions about anonymization of smart meters, however, they still have some potential threats. In this paper, we describe an enhanced method to protect the privacy of consumer data. When metering data are required by a utility or the electrical energy distribution center for operational reasons, data are delivered not with the real IDs but with temporary IDs. In addition, these temporary IDs are changed randomly to prevent the attackers from analyzing the energy usage patterns. We also describe secure data transmission method for securing data delivered. In this way, we can enhance the privacy of Smart Grid System with low overhead.

A Study on the Application of Artificial Intelligence in Symbolic Execution: Usage in fuzzing and vulnerability detection (기호 실행에서의 인공 지능 적용에 대한 연구: 퍼징과 취약점 탐지에서의 활용)

  • Ha, Whoi Ree;Ahn, Sunwoo;Kim, Hyunjun;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.582-584
    • /
    • 2020
  • 기호 실행 (symbolic execution)은 프로그램을 특정 상태로 구동하는 입력 값을 찾는 코드 분석기법이다. 이를 사용하면 자동화 소프트웨어 테스트 기법인 퍼징 (fuzzing)을 훨씬 효율적으로 사용하여 더 많은 보안 취약점을 찾을 수 있지만, 기호 실행의 한계점으로 인하여 쉽게 적용할 수 없었다. 이를 해결하기 위해 인공 지능을 활용한 방법을 소개하겠다.

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

Instructional Design of m-Learning for Effective PBL in Engineering Education (공학교육에서 효율적 PBL을 위한 m-러닝 교수설계)

  • Lee, Keunsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.619-623
    • /
    • 2018
  • This paper aimed to design a computer course teaching-learning strategy for (m-learning?) to be used in a Problem Based Learning (PBL) environment. The research findings were as follows. Firstly, learning contents were provided as educational tools for mobile device usage. The educational contents provided were designed for effective usage on mobile devices, such as smartphones, thereby making mobile devices suitable for use as learning tools. Secondly, learning contents for PBL were provided. PBL problems (for computer engineering courses) were made with the principles of teaching plans. The learning objectives were achieved through the problem-solving progress of the learners and their self-directed and cooperative learnings. Thirdly, learning resources were provided that were easily accessible through smartphones, laptops and PDAs. This study is about the PBL instructional design of creative engineering design subjects, which aims to foster talent. The PBL model developed in this study consists of Analysis, Design, Development, Implementation, and Evaluation. We made a plan for creative engineering design subjects based on PBL, and focused on the process of PBL. This research was able to establish the basis for PBL usage in Engineering Schools and help achieve its ultimate goal of endowing professional intellectuals with creative problem-solving abilities.

Next Generation Information Infrastructure and Database Service-Policy Frame and Market Development in Japan

  • Miyakawa, Takayasu
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.9-16
    • /
    • 1994
  • Author outlines briefly developments of policies relating to telecommunication infrastructure and databases since latter half of 1970′s. There exist three phases. The first phase was from later 1970′s to 1985, which was an initial stage of electronic information service in Japan. In the second phase, 1985~1990, basic policy change made possible the privatization of telecommunication services and proliferation of database products and vendors, The third phase began in early 1990′s with downsizing in computer usage, wide-spreading information networks and rapid dissemination of personal computers. Then author describes offers on policy formation for "novel information infrastructure" and current situation concerning the "Internet" in Japan. Finally, tasks and problems for implementing new generation program for information infrastructure and database usage are pointed out, These are knowledge resource, cost, copyrights and cultural problems including language.

  • PDF

Instant Messaging Usage and Interruptions in the Workplace

  • Chang, Hui-Jung;Ian, Wan-Zheng
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.2
    • /
    • pp.25-47
    • /
    • 2014
  • The goal of the present study is to explore IM interruption by relating it to media choices and purposes of IM use in the workplace. Two major media choice concepts were: media richness and social influence; while four purposes of IM use were: organization work, knowledge work, socializing, and boundary spanning activities. Data (N = 283) were collected via a combination of convenience and snowball sampling of "computer-using workers" in Taiwan, based on the Standard Occupational Classification system published by the Taiwan government. Results indicated that media choice works better than purpose of IM use to explain IM interruption. Among them, social influence was the best predictor to IM interruption in the workplace. In addition, instant feedback and personalization provided by IM, and IM usage for the purposes of knowledge work and socializing, also relate to IM interruption in the workplace.

Design and Development of Agriculture Drone battery usage Monitoring System using Wireless sensor network

  • Lee, Sang-Hyun;Yang, Seung-Hak;You, Yong-Min
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.38-44
    • /
    • 2017
  • Currently, wired gables have been installed or portable storage devices have been installed for data acquisition of flying drone. In this paper, we propose a technology to transmit data wirelessly by sensing information such as battery discharge value, acceleration, and temperature by attaching RF sensor to a drone. The purpose of this paper is to design and develop the monitoring technology of agriculture drone battery usage in real time using RF sensor. In this paper, we propose a monitoring system that can check real time data of battery changed value, temperature, and acceleration during pesticide control activity of agricultural drone.

Generating Activity-based Diary from PC Usage Logs

  • Sadita, Lia;Kim, Hyoung-Nyoun;Park, Ji-Hyung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.339-341
    • /
    • 2012
  • This paper presents a method for generating an autonomous activity-based diary in the environment including a personal computer (PC). In order to record a user's various tasks in front of a PC, we consider the contextual information such as current time, opened programs, and user interactions. As one modality for the user interaction, a motion sensor was applied to recognize a user's hand gestures in case that the activity is conducted without interaction between the user and the PC. Moreover, we propose a temporal clustering method to recapitulate the sequential and meaningful activity in the stream of extracted PC usage logs. By combining those two processes, we summarize the user activities in the PC environment.

An Empirical Study on Classification of the Housing Lifestyle in Urban (현대 도시의 주거생활양식 유형 분류에 관한 연구)

  • MockWhaChoi
    • Journal of the Korean housing association
    • /
    • v.2 no.1
    • /
    • pp.1-12
    • /
    • 1991
  • The purpose of this study was to classify the types of housing life style. Housing life style was measured using four variables : furniture usage pattern, space usage pattern, family living pattern and heating system. A final Instrument was developed through the two stage pilot surveys. The respondents were 1,292 home-makers of the middle and high economic classes In Seoul and Daejeon, selected through stratified random sampling technique. Data were analyzed using SAS computer packages. The statistics used were frequency, percentage, Pear-3on`s correlation coefficient, Multiple Linear Regression, X2, and cluster analysis.The major findings were as follows : Five representative types of housing life style were found through cluster analysis. They were conventional minimum level life style, conventional optimum famiIy-centered life style, eclectic family-centered life style, contemporary optimum family - centered and contemporary so-cial, leasure-oriented life style.

  • PDF