• Title/Summary/Keyword: ICT-based system

Search Result 921, Processing Time 0.029 seconds

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns

  • Lee, Suchul;Lee, Sungil;Lee, Jun-Rak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1557-1569
    • /
    • 2017
  • In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called "hyper-connected world." The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital data. However, it is challenging to handle voluminous data with IoT devices because such devices generally lack sufficient computational capability. In this study, we examine the IoT from the perspective of security and digital forensics. SQLite is a light-weight database management system (DBMS) used in many IoT applications that stores private information. This information can be used in digital forensics as evidence. However, it is difficult to obtain critical evidence from IoT devices because the digital data stored in these devices is frequently deleted or updated. To address this issue, we propose Schema Pattern-based Recovery (SPaRe), an SQLite recovery scheme that leverages the pattern of a database schema. In particular, SPaRe exhaustively explores an SQLite database file and identifies all schematic patterns of a database record. We implemented SPaRe on an iPhone 6 running iOS 7 in order to test its performance. The results confirmed that SPaRe recovers an SQLite record at a high recovery rate.

Strategies to approach the customized health management service to prevent chronic diseases (만성질환 예방을 위한 맞춤형 건강관리 서비스의 접근전략과 발전방향)

  • Kim, Young-Bok
    • Korean Journal of Health Education and Promotion
    • /
    • v.33 no.4
    • /
    • pp.89-100
    • /
    • 2016
  • Objectives: Life style modification leads to decrease health risk and change of health status for person at health risk. This study aimed to suggest essential components and effective strategies for customized health management service to provide individual and risk group in public and private health care organizations. Methods: To systematic review the essential component of health management service, I performed to collect political legislation, research papers, reports, publication and public release for heath management service from 2008 to 2016. Essential components of heath management service were service scope, service design, organizations and applied technology. Results: Service cope was composed of health risk factors, such as smoking, drinking, nutrition, physical activity and weight control. Main strategies were customized health management services, personalized behavior modification programs, evidence-based service protocol, utilization of information and communications technology (ICT), multi-dimension and multi-level approach, and public and private organizations partnership through health policies and health care system. Conclusions: To make the most of the limited resources, it should require a systematic approach that focuses on continuous monitoring and partnership of health management service.

Identifying the Determinants and the Dynamic Characteristics of ICT Non-Use: A Qualitative Study by Grounded Theory Methodolgy (정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적 연구)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-20
    • /
    • 2018
  • Purpose The purpose of this study is to identify the determinants of non-use and the dynamic nature of non-use by the qualitative research methodology, grounded theory methodology, as part of identifying the nature of non-use. Design/methodology/approach We applied the grounded theory methodology to a total of 23 college students, including non-users who are not currently using them, users with low intention to use them, and users with high intention to use. We extracted the codes related to the use and proposed the non-use dynamics conversion process based on the coding results. Findings First, the use of information technology can also promote the frequency of use, but can also lead to the use of negative attitudes which would fall in the state of non-use. Second, the user may have both positive and negative attitudes toward the current information technology. Third, if usage is dominated by habits, it is not so easy to change persistent use into an unused state. Fourth, factors that determine the use of specific information technology can be a factor in determining nonuse. This study has contributed to understand the essence of non - use as well as the nature of use, overcoming limitations of quantitative research approach and confirming possibility of grounded theory method in information system research.

A Study on Composition of Context-based Soccer Analysis System (축구 경기 내용 자동 안식 시스템 구성에 관한 연구)

  • Lee, Jiwon;Nam, Dowon;Lee, JeongSoo;Moon, Sungwon;Kim, Kyungill;Kim, Howon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.651-652
    • /
    • 2016
  • 최근 스포츠 과학과 ICT 기술을 접목하여 스포츠 활동올 분석하고자 하는 시도가 증가하고 있다. 이런 양상은 축구 경기에 대한 분석에서도 나타나고 있으며, 그 목적에 따라 다양한 방법으로 분석을 시도한 사례를 쉽게 발견 할 수 있다. 하지만, 현재까지 제시된 시스템들은 높은 수준의 경기 내용 분석올 제공하려는 시도를 보이지 않고 있다. 본 논문은 통계 분석 위주의 현재 축구 분석 시스템의 한계에 대해 논한 후 이를 내용 이해 기반으로 끌어올리기 위한 시스템의 구성 방법에 대한 구체적인 안을 제시하였다. 제안하는 시스템의 개발을 통하여 새로운 양상의 서비스와 산업 생태계 측면의 긍정적 변화를 기대할 수 있다.

A Study of the Three Port NPC based DAB Converter for the Bipolar DC Grid (양극성 직류 배전망에 적용 가능한 3포트 NPC 기반의 DAB 컨버터에 대한 연구)

  • Yun, Hyeok-Jin;Kim, Myoungho;Baek, Ju-Won;Kim, Ju-Yong;Kim, Hee-Je
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.22 no.4
    • /
    • pp.336-344
    • /
    • 2017
  • This paper presents the three-port DC-DC converter modeling and controller design procedure, which is part of the solid-state transformer (SST) to interface medium voltage AC grid to bipolar DC distribution network. Due to the high primary side DC link voltage, the proposed converter employs the three-level neutral point clamped (NPC) topology at the primary side and 2-two level half bridge circuits for each DC distribution network. For the proposed converter particular structure, this paper conducts modeling the three winding transformer and the power transfer between each port. A decoupling method is adopted to simplify the power transfer model. The voltage controller design procedure is presented. In addition, the output current sharing controller is employed for current balancing between the parallel-connected secondary output ports. The proposed circuit and controller performance are verified by experimental results using a 30 kW prototype SST system.

Study on the Content Development of Mobile AR_HMD through a Real Time 360 Image Processing. (360° 실시간 영상처리를 통한 모바일 AR_HMD 콘텐츠 개발을 위한 연구)

  • Lee, Changhyun;Kim, Youngseop;Kim, Yeonmin;Park, Inho;Choi, JaeHak;Lee, Yonghwan;Han, Woori
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.2
    • /
    • pp.66-69
    • /
    • 2016
  • Recently, augmented reality and virtual reality in the ICT sector have been highlighted. So also interested in related HMD areas to facilitate contact with the VR content is being attend. This paper proposes a method for implementing to the virtual reality through the mobile HMD device with the real time 360 image. This system is required the real time 360 image streaming server configuration and image processing for augmented reality and virtual reality. The configuration of the streaming server is configured the DB server to store images and the relay server that can relay images to other devices. Augmented image processing module is composed based on markerless tracking, and there are four modules that are recognition, tracking, detecting and learning module. Also, the purpose of this paper is shown the augmented 360 image processing through the Mobile HMD.

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

A Study on Design for Incipient Failure Detection and Prediction System of Electric Supply Equipments Based on IoT (loT 기반의 배전설비 고장 감지 및 예지 시스템 설계에 관한 연구)

  • Kim, Hong-Geun;Lee, Myeong-Bae;Cho, Yong-Yun;Park, Jang-Woo;Shin, Chang-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.405-407
    • /
    • 2016
  • 최근, ICT/loT 기술과의 융합은 다양한 산업분야에 적용되고 있으며, 안정적인 전력공급 및 지능형전력망 구축에 대해 다양한 연구가 이루어지고 있다. 특히, 수요라인과 직접적으로 연관된 배전계통의 효율적인 운영 및 배전설비의 유지/관리 기술에 대한 연구에 많은 연구를 수행하고 있다. 본 논문에서는 다양한 배전설비에 대한 환경정보를 loT 센서를 통해 수집함으로써 실시간으로 정전상황을 불러올 수 있는 기자재의 고장감지 및 예측을 위한 시스템 모델을 제안한다. 제안하는 시스템 모델은 실시간으로 수집되는 정보들에 대해 시계열 기반의 필터링 및 이상점 판단을 위한 성분 분석을 실시하고, 고장진단 및 예측을 위해 기계학습 기반의 데이터 분석실시하여 기자재들의 고장감지 및 고장 발생 여부를 예측한다.

Development of an Application for Mobile Devices to Analyze Data Set by a Self-Organizing Map : A Case Study on Saga Prefectural Sightseeing Information

  • Wakuya, Hiroshi;Horinouchi, Yu;Itoh, Hideaki
    • International Journal of Contents
    • /
    • v.9 no.3
    • /
    • pp.15-18
    • /
    • 2013
  • In the preceding studies, an analysis of Saga Prefectural sightseeing information by a Self-Organizing Map (SOM) has been tried. And recent development on Information and Communication Technology (ICT) will help us to access any results via the mobile devices easily. This is why the mobile devices, e.g., smartphones and tablet computers, have an operating system installed, and we can improve their functions by downloading any applications on the Web. Then, in order to realize this basic idea, development of an application for the mobile devices is investigated through some computer simulations on the standard desktop PC in this paper. As a result, it is found that i) a developed feature map is useful to identify some candidate topics, ii) a touchscreen is suitable to show the feature map, and iii) arrangement of the feature map can be modified based on our interests. Then, it is concluded that the proposed idea seems to be applicable, even though further consideration is required to brush it up.

Enhanced Secure Transaction Protocol for IoT Devices via LTE Network (LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래)

  • AL-Alkeem, Ebrahim;Yeun, Chan Yeob;Hammadi, Yousef Al;Yeun, Hyun Ku;Byon, Young-Ji
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1921-1936
    • /
    • 2017
  • Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.