• Title/Summary/Keyword: Digital Trace

Search Result 133, Processing Time 0.026 seconds

A study of the Concept of Analogue-Digital Interaction Trace and its Application in Media Art ('아날로그-디지털 인터랙션 흔적'에 관한 개념 연구와 미디어 아트에의 응용)

  • Choi, Min-A;Kwon, Doo-Young
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.76-84
    • /
    • 2011
  • This paper describes the development of the media art environment concept, in which the user's interaction becomes visual arts in both digital and analogue media. It describes AD-Trace, an experimental media art component that investigates the aesthetic and technological possibilities through the development of interactive media artworks that utilizes that the traces of the user's interaction. The AD-Trace consists of three design components: Analogue Trace, Digital Trace, and Interaction Metaphor to guide user interactions with user's understanding. Three artworks are proposed to demonstrate the real world applications of the concept: AD-PD(analogue digital picture diary), AD-Star (analogue digital star), and AD-Map (analogue digital map).

The Acquisition Methodology Study of User Trace Data in Mac OS X (Mac OS X 운영체제상의 사용자 흔적정보 수집방안 연구)

  • Choi, Joon-Ho;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.335-346
    • /
    • 2010
  • Mac OS X is the Computer Operating System that develop in Apple Inc. Mac OS X is the successor to Mac OS 9 Version which had been Apple's primary operating system since 1984. Recently, Mac OS X 10.6 (Snow Leopard) has been manufactured and is distributed to user. Apple's Mac OS X Operating System is occupying about 10% in the world Operating System market share. But, Forensic tools that is utilized on digital forensic investigation can not forensic analysis about Mac OS X properly. To do forensic investigation about Mac OS X, information connected with user's action and trace can become important digital evidence in Operating System. This paper presents way about user trace data acquisition methodology in Mac OS X.

A Study on Making Map of Flood Using Digital Elevation Model (DEM) (수치표고모형 (DEM)을 이용한 침수재해 지도작성에 관한 연구)

  • Lim, Hyun Taek;Kim, Jae Hwi;Lee, Hak Beom;Park, Sung Yong;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.81-90
    • /
    • 2017
  • Recent floodplain data are important for river master plan, storm and flood damage reduction comprehensive plan and pre-disaster impact assessment. Hazard map, base of floodplain data, is being emphasized as important method of non-structural flood prevention and consist of inundation trace map, inundation expected map and hazard information map. Inundation trace map describes distribution of area that damaged from typhoons, heavy rain and tsunamis and includes identified flood level, flood depth and flood time from flooding area. However due to lack of these data by local government, which are foundational and supposed to be well prepared nationwide, having hard time for making inundation trace map or hazard information map. To overcome this problem, time consumption and budget reduction is required through various research. From this study, DEM (Digital Elevation Model) from image material from UAVS (Unmanned Aerial Vehicle System) and numeric geographic map from National Geographic Information Institute are used for calculating flooding damaged area and compared with inundation trace map. As results, inundation trace map DEM based on image material from UAVS had better accuracy than that used DEM based on numeric geographic map. And making hazard map could be easier and more accurate by utilizing image material from UAVS than before.

Identifying Unusual Days

  • Kim, Min-Kyong;Kotz, David
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.71-84
    • /
    • 2011
  • Pervasive applications such as digital memories or patient monitors collect a vast amount of data. One key challenge in these systems is how to extract interesting or unusual information. Because users cannot anticipate their future interests in the data when the data is stored, it is hard to provide appropriate indexes. As location-tracking technologies, such as global positioning system, have become ubiquitous, digital cameras or other pervasive systems record location information along with the data. In this paper, we present an automatic approach to identify unusual data using location information. Given the location information, our system identifies unusual days, that is, days with unusual mobility patterns. We evaluated our detection system using a real wireless trace, collected at wireless access points, and demonstrated its capabilities. Using our system, we were able to identify days when mobility patterns changed and differentiate days when a user followed a regular pattern from the rest. We also discovered general mobility characteristics. For example, most users had one or more repeating mobility patterns, and repeating mobility patterns did not depend on certain days of the week, except that weekends were different from weekdays.

Attack Path and Intention Recognition System for detecting APT Attack (APT 공격 탐지를 위한 공격 경로 및 의도 인지 시스템)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.67-78
    • /
    • 2020
  • Typical security solutions such as intrusion detection system are not suitable for detecting advanced persistent attack(APT), because they cannot draw the big picture from trivial events of security solutions. Researches on techniques for detecting multiple stage attacks by analyzing the correlations between security events or alerts are being actively conducted in academic field. However, these studies still use events from existing security system, and there is insufficient research on the structure of the entire security system suitable for advanced persistent attacks. In this paper, we propose an attack path and intention recognition system suitable for multiple stage attacks like advanced persistent attack detection. The proposed system defines the trace format and overall structure of the system that detects APT attacks based on the correlation and behavior analysis, and is designed with a structure of detection system using deep learning and big data technology, etc.

A Study of Path Management to Efficient Traceback Technique for MANET (MANET에서 효율적 역추적을 위한 경로관리에 관한 연구)

  • Yang, Hwan Seok;Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2011
  • Recently, MANET(Mobile Ad-hoc Network) is developing increasingly in the wireless network. MANET has weakness because phases change frequently and MANET doesn't have middle management system. Every node which consists of MANET has to perform data forwarding, but traceback is not reliable if these nodes do malicious action owing to attack. It also is not easy to find location of attacker when it is attacked as moving of nodes. In this paper, we propose a hierarchical-based traceback method that reduce waste of memory and can manage path information efficiently. In order to manage trace path information and reduce using resource in the cluster head after network is formed to cluster, method which recomposes the path efficiently is proposed. Proposed method in this paper can reduce path trace failure rate remarkably due to moving of nodes. It can also reduce the cost for traceback and time it takes to collect information.

The effect of ambiguity of information on Covid-19 patients' contact trace on intention to visit the commercial district: Comparison of residents in Gangnam-gu and Seocho-gu (코로나19 확진자 동선정보의 모호성 차이가 유관 상권 방문의도에 미치는 영향 연구: 강남구민과 서초구민의 비교)

  • Min, Dongwon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.179-184
    • /
    • 2020
  • This study aims to investigate the effect that local government's information release range on Covid-19 patients' contact trace on consumer sentiment in the region. One hundred twenty-eight residents of Gangnam-gu and Seocho-gu participated in the study. The results showed that when ambiguity of information increased perceived anxiety on Covid-19 patients' contact trace, which in turn led lower intention to visit the commercial district near the Covid-19 patients' contact trace. Based on the findings, several suggestions was proposed for future research, including longitudinal studies covering even the "long-term" changes in consumer sentiment, the effect of implicit anxiety, and the behavioral difference between residence and non-residence.

공정한 은닉 KCDSA 서명에 기반한 추적 가능한 전자화폐 시스템

  • 이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.85-97
    • /
    • 1999
  • A blind signature scheme is a protocol allowing verifier to obtain a valid signature for a message m from a signer without him seeing the message. This means that the bank in collaboration with the shop cannot trace the electronic cash to user. However anonymous electronic cash also facilitates fraud and criminal acts such as money laundering anonymous blackmailing and illegal purchaes. Therefore in this paper we propose fair blind signature scheme based on KCDSA which is a domestic digital signature scheme and it apply a electronic cash system. In particularly a proposed electronic cash system have an anonymity control ability which trace a user who make use a electronic cash illegally in association with a trusted center.

VLSI Design of Soft Decision Viterbi Decoder Using Systolic Array Architecture (역추적 방식의 시스토릭 어레이 구조를 가진 연판정 비터비 복호기의 설계)

  • Kim, Ki-Bo;Kim, Jong-Tae
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3199-3201
    • /
    • 1999
  • Convolutional coding with Viterbi decoding is known as a powerful method for forward error correction among many kinds of channel coding methods. This paper presents a soft decision Viterbi decoder which has systolic array trace-back architecture[1]. Soft decision is known as more effective method than hard decision and most of digital communication systems use soft decision. The advantage of using a systolic array decoder is that the trace-back operation can be accomplished continuously in an array of registers in a pipe-line fashion, instead of waiting for the entire trace-back procedure to be completed at each iteration. Therefore it may be suitable for faster communication system. We described operations of each module of the decoder and showed results of the logic synthesis and functional simulation.

  • PDF

Analysis of Skin Movement Artifacts Using MR Images (자기공명 영상을 이용한 피부 움직임 에러 분석에 관한 연구)

  • ;N. Miyata;M. Kouchi;M. Mochimaru
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.8
    • /
    • pp.164-170
    • /
    • 2004
  • The skin movement artifacts are referred to as the relative motion of skin with respect to the motion of underlying bones. This is of great importance in joint biomechanics or internal kinematics of human body. This paper describes a novel experiment that measures the skin movement of a hand based on MR(magnetic resonance) images in conjunction with surface modeling techniques. The proposed approach consists of 3 phases: (1) MR scanning of a hand with surface makers, (2) 3D reconstruction from the MR images, and (3) registration of the 3D models. The MR images of the hand are captured by 3 different postures. And the surface makers which are attached to the skin are employed to trace the skin motion. After reconstruction of 3D models from the scanned MR images, the global registration is applied to the 3D models based on the particular bone shape of different postures. The results of registration are then used to trace the skin movement by measuring the positions of the surface markers.