• Title/Summary/Keyword: Internet Popularization

Search Result 112, Processing Time 0.026 seconds

Design of an Intrusion Detection and Self-treatment System for IoT (사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2018
  • With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

User Sensor Priority Configuration and Work Management System in IoT Environment (사용자 센서 우선순위 설정 및 작업 관리 시스템)

  • Jeong, Do-Hyeong;Natsagdorj, Batdorj;Choi, Hyung-Wook;Jang, Ki-Man;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.603-604
    • /
    • 2016
  • Due to the recent popularization and commercialization of smart devices the change in the IoT(Internet of Things) environment continues. Thus a personalized service to the individual characteristics it is required by the user increases. However, existing systems are provided, there is a problem that only generalized service to the user, because the operation is manually carried out according to the rules set by the developer. In this paper, we design a custom operation management system to solve this problem. User to prioritize each of the sensors through the application Accordingly manages the sensor. This allows the user to perform an action is thought to be for the individual characteristics and can expect a more efficient productivity.

  • PDF

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

A Tag Clustering and Recommendation Method for Photo Categorization (사진 콘텐츠 분류를 위한 태그 클러스터링 기법 및 태그 추천)

  • Won, Ji-Hyeon;Lee, Jongwoo;Park, Heemin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.1-13
    • /
    • 2013
  • Recent advance and popularization of smart devices and web application services based on cloud computing have made end-users to directly produce and, at the same time, consume the image contents. This leads to demands of unified contents management services. Thus, this paper proposestag clustering method based on semantic similarity for effective image categorization. We calculate the cost of semantic similarity between tags and cluster tags that are closely related. If tags are in a cluster, we suppose that images with them are also in a same cluster. Furthermore, we could recommend tags for new images on the basis of initial clusters.

Accuracy Urinalysis Discrimination Method based on high performance CNN (고성능 CNN 기반 정밀 요검사 판별 기법)

  • Baek, Seung-Hyeok;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.77-82
    • /
    • 2021
  • There are three types of urinalysis: physical test, chemical test, and microscopic test. Among these, the chemical urinalysis is an easily accessible method of the general public to compare the chemical reaction of urinalysis strip with a standard colorimetric table by sight or purchase the portable urinalysis machine separately. Currently, with the popularization of smartphone, research on the urinalysis service using smartphone is increasing. The urinalysis screening application is one of the urinalysis services using a smartphone. However, the RGB values of the urinalysis pad taken by the urinalysis screening application have large deviations due to the effect of lighting. Deviation of RGB value debases the accuracy of urinalysis discrimination. Therefore, in this paper, the accuracy of urinaylsis pad image discrimination is improved through CNN after classifying urinalysis strips taken by the urinalysis screening application based on smartphone by urinalysis pad items. Urinalysis strip was taken from various backgrounds to generate CNN image, and urinalysis discrimination was analyzed using the ResNet-50 CNN model.

Applications to Recommend Moving Route by Schedule Using the Route Search System of Map API (지도 API의 경로 탐색 시스템을 활용한 일정 별 동선 추천 애플리케이션)

  • Ji-Woo Kim;Jung-Yi Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.1-6
    • /
    • 2023
  • The purpose of this study is to research and develop so that users who are gradually progressing in the popularization of smartphones and the calculation of agricultural quality can use more active and flexible applications than existing application fields. People use event management applications to remember what they need to do, and maps applications to get to their appointments on time. You will need to build a glue-delivered application that leverages the Maps API to be able to recommend the glove's path for events so that the user can use the application temporarily. By comparing and analyzing currently used calendar, map, and schedule applications, several Open Maps APIs were compared to supplement the weaknesses and develop applications that converge the strengths. The results of application development by applying the optimal algorithm for recommending traffic routes according to time and place for the schedule registered by the user are described.

Impact of Moral Intensity on Moral Behavior in the context of Artificial Intelligence: The Mediating Role of Technology Moral Sense

  • Wen Wu;Xiuqing Huang;Seth Y. Ntim;Yue Shen;Xinyu Li;GuoPeng Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1583-1598
    • /
    • 2024
  • With the popularization and application of artificial intelligence technology in daily life, new ethical and moral problems constantly appear in human society. These ethical and moral problems have been associated with people's moral behavior and have become crucial issues. In traditional social situations, researches have proved that moral intensity affects people's moral behavior. However, in the context of applying artificial intelligence technology, the mechanism between moral intensity and moral behavior is unknown. Therefore, this study focuses on the relationship between moral intensity and moral behavior in the context of applying artificial intelligence technology, and introduces a new concept - technology moral sense (TMS) into the theoretical model. Research method: We set various situations of applying artificial intelligence technology and adopt the situational experiment method to analyze the relationship between moral intensity and moral behavior in different application scenarios. The results show that moral intensity has a significant influence on moral behavior, while the technology moral sense performs a mediating function.

Design and Implementation of Internet Spatial Data Service Component based Open GIS Specification (개방형 GIS 기반 인터넷 공간 데이터서비스 컴포넌트의 설계 및 구현)

  • Choi, Sang-Kil;Lee, Jin-Kyu;Lee, Jong-Won;Kim, Jang-Su
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.21-31
    • /
    • 1999
  • In accordance with the completion of the spatial database building works in the central and/or local government authorities as well as the rapid popularization of various information services through internet, it is heavily required to provide spatial information services through World Wide Web. To provide a qualified spatial information service, it is crucial to have a Web-based GIS (Geographic Information Service) service system equipped with the publicity, the convenient accessibility, and the easy-to-use user interface. In this paper, we introduce a new component system for Web-based spatial information services based on the OpenGIS Simple Feature specification for OLE/COM[3] and OLE DB specification[4]. The important functionality of a Web-based spatial information service system includes its accessibility of various existing GIS server system and huge databases in addition to the resolution of response-time delay problems caused by transmitting a large amount of digital maps via internet[6]. To cope with these problems, our component system has been designed to access heterogeneous databases in transparent manner and to support vector-based and/or image-based image production techniques for shortening transmission time.

  • PDF

A Study on Improving the Billing System of the Wireless Internet Service (무선인터넷 서비스의 과금체계 개선에 관한 연구)

  • Min Gyeongju;Hong Jaehwan;Nam Sangsig;Kim Jeongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.597-602
    • /
    • 2005
  • In this study, file size for measurement and the service system's billing data were submitted to a comparative analysis by performing a verification test on the billing system of three major mobile communication services providers, based on the wireless Internet service packet. As shown in the result of the verification test, there were some differences in the billing data due to transmission overhead, according to the network quality that is affected by the wireless environment of mobile operators. Consequently, the packet analysis system was proposed as a means of applying consistent packet billing to all service providers being compared. If the packet analysis system is added to supplement the current billing system various user requirements can be met. Billing by Packet among mobile operators and differentiated billing based on the content value are available, since the packet data can be extracted through protocol analysis by service, and it can be classified by content tape through traffic data analysis. Furthermore, customer's needs can be satisfied who request more information on the detailed usage, and more flexible and diverse billing policies can be supported like application of charging conditions to the non-charging packet handling. All these services are expected to contribute to the popularization of the wireless Internet service, since user complaints about the service charge could be reduced.

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.