• Title/Summary/Keyword: Internet Use Frequency

Search Result 329, Processing Time 0.026 seconds

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

MalDC: Malicious Software Detection and Classification using Machine Learning

  • Moon, Jaewoong;Kim, Subin;Park, Jangyong;Lee, Jieun;Kim, Kyungshin;Song, Jaeseung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1466-1488
    • /
    • 2022
  • Recently, the importance and necessity of artificial intelligence (AI), especially machine learning, has been emphasized. In fact, studies are actively underway to solve complex and challenging problems through the use of AI systems, such as intelligent CCTVs, intelligent AI security systems, and AI surgical robots. Information security that involves analysis and response to security vulnerabilities of software is no exception to this and is recognized as one of the fields wherein significant results are expected when AI is applied. This is because the frequency of malware incidents is gradually increasing, and the available security technologies are limited with regard to the use of software security experts or source code analysis tools. We conducted a study on MalDC, a technique that converts malware into images using machine learning, MalDC showed good performance and was able to analyze and classify different types of malware. MalDC applies a preprocessing step to minimize the noise generated in the image conversion process and employs an image augmentation technique to reinforce the insufficient dataset, thus improving the accuracy of the malware classification. To verify the feasibility of our method, we tested the malware classification technique used by MalDC on a dataset provided by Microsoft and malware data collected by the Korea Internet & Security Agency (KISA). Consequently, an accuracy of 97% was achieved.

Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features

  • Shao, Xiaorui;Wang, Lijiang;Kim, Chang Soo;Ra, Ilkyeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1610-1629
    • /
    • 2021
  • Failures frequently occurred in manufacturing machines due to complex and changeable manufacturing environments, increasing the downtime and maintenance costs. This manuscript develops a novel deep learning-based method named Multi-Domain Convolutional Neural Network (MDCNN) to deal with this challenging task with vibration signals. The proposed MDCNN consists of time-domain, frequency-domain, and statistical-domain feature channels. The Time-domain channel is to model the hidden patterns of signals in the time domain. The frequency-domain channel uses Discrete Wavelet Transformation (DWT) to obtain the rich feature representations of signals in the frequency domain. The statistic-domain channel contains six statistical variables, which is to reflect the signals' macro statistical-domain features, respectively. Firstly, in the proposed MDCNN, time-domain and frequency-domain channels are processed by CNN individually with various filters. Secondly, the CNN extracted features from time, and frequency domains are merged as time-frequency features. Lastly, time-frequency domain features are fused with six statistical variables as the comprehensive features for identifying the fault. Thereby, the proposed method could make full use of those three domain-features for fault diagnosis while keeping high distinguishability due to CNN's utilization. The authors designed massive experiments with 10-folder cross-validation technology to validate the proposed method's effectiveness on the CWRU bearing data set. The experimental results are calculated by ten-time averaged accuracy. They have confirmed that the proposed MDCNN could intelligently, accurately, and timely detect the fault under the complex manufacturing environments, whose accuracy is nearly 100%.

The Effects of Web-based Learning Experiences, Learning style, and Internet Self-efficacy on the Beliefs of Beginning Child Care Teachers about Web-based Learning (초임보육교사의 웹기반 학습경험, 학습유형, 인터넷 자기효능감이 웹기반 학습신념에 미치는 영향)

  • Yoon, Gab Jung;Kim, Mi Jung
    • Korean Journal of Childcare and Education
    • /
    • v.10 no.1
    • /
    • pp.5-26
    • /
    • 2014
  • This study examined the effects of web-based learning experiences, learning style, and Internet self-efficacy that influence beginning child care teachers belief about web-based learning. The participants were 215 beginning child care teachers who work in child care centers. Data were analyzed by means of frequency analysis, correlation, and multiple regression for SPSS windows. The results were as follows: First, significant statistical differences were detected in web-based learning experiences and beliefs about web-based learning. Online teacher learning community use and frequency were significant gaps in beliefs about web-based learning. Second, there were statistical differences in learning styles and beliefs about web-based learning. And teachers with assimilator learning style showed high difficulty beliefs about web-based learning. Third, teachers' belief about web-based learning was significantly related to Internet self-efficacy. It means that teachers that have high Internet self-efficacy show high belief about web-based learning. Forth, among the teachers' personal variables, a higher level of online teacher learning community use and Internet self-efficacy predicted higher beliefs about web-based learning. Thus, this study suggested the importance of web-based learning experiences and Internet self-efficacy to beliefs about web-based learning. And it implicated ways to improve positive beliefs about web-based learning of beginning child care teachers.

A Study on the Effect of Next-Generation Mobile Advertising Service for TV Advertising Effectiveness (TV 광고 효과 향상을 위한 차세대 모바일 광고서비스 효과 연구)

  • Choi, Minkyung;Lee, Ook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • This study suggests that 'Will not we use more smartphones while watching TV commercials? Then, will the TV advertising effect decrease due to the distributed concentration?". As a result of the preliminary study, it was confirmed that about 63% of users watching TV commercials use smartphones together. In this study, we propose the possibility of a new mobile advertising service by experimenting and analyzing the effect of high frequency technology based TV advertising linked mobile advertising service. Experimental results show that the response rate of the same content is improved about 9 times as compared with that of the general mobile advertisement when the advertisement of the same content is provided by the TV advertisement interlocking type. It can be confirmed that it is quite effective to provide the same content advertisement to the customers who are in front of the TV at the time of sending the TV advertisement. Therefore, it is expected that various services based on high frequency technology will be activated as a new advertising service that will preserve the effect of TV commercials in the future.

Design for Broadband Drive Amplifier of Frequency Split Type using GaAs HBT Process (GaAs HBT 공정을 이용한 주파수 분배 방식의 광대역 구동증폭기 설계)

  • Kim, Minchul;Kim, Junghyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.135-140
    • /
    • 2019
  • In this paper, a frequency split type broadband drive amplifier operating in the L, S and C bands was designed and fabricated. Transistor is difficult to efficiently use when the fractional bandwidth of the drive amplifier is more than 100%, In particular, the characteristics of the driving amplifier are important for operating the power amplifier in which the characteristics of the output power and the efficiency are sensitively changed according to the frequency band. A frequency split methods was applied to maximize the bandwidth of a drive amplifier and to divide the output of the drive amplifier into low band and high band so that the transistor of the power amplifier located at the rear of the drive amplifier can be efficiently used. The designed drive amplifier was fabricated in GaAs HBT technology and 9-layer SiP, and verified by the measurements. The fabricated drive amplifier shows a gain of more than 8 dB and an output power of more than 15 dBm in the operating frequency range.

Internet Pornography Seeking and Sexual Violence(Rape) Myth Acceptance Attitude in College Students (대학생들의 인터넷 음란물 추구성과 성폭력(강간) 통념 수용태도)

  • Lee, Inn-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.2852-2861
    • /
    • 2013
  • The purpose of this study was to investigate the relationship between internet pornography seeking and sexual violence(rape) myth acceptance attitudes in college students. The participants included 381 college students by a convenience sample method and agreed to participate in the study. Data were collected from September, 2 to September 14, 2012 and analysed using SPSS/PC Win 12.0 program. The major finding were as follows; The scoe of internet pornography seeking was 19.57 and the scoe of sexual violence(rape) myth acceptance attitudes was 9.68. There were significant differences in the internet pornography seeking according to sex, major, internet use time, experience, time, frequency, place, companion, reason of internet pornography contact, and the most sexual stimualting material. There were significant differences in the sexual violence(rape) myth acceptance attitudes according to sex, age, major, companion of internet pornography contact, the most frequently contacting internet pornography, and the most sexually exciting internet pornography. There was significant positive relationship between internet pornography seeking and sexual violence(rape) myth acceptance attitude.

The Status of the Utilization Internet and Dietary Information by Elementary School Dietitians in the Gyeongnam and Jeonbuk Areas (평남과 전북지역 초등학교 영양사의 인터넷 및 식생활정보 이용실태)

  • 허은실;이경혜
    • Korean Journal of Community Nutrition
    • /
    • v.8 no.4
    • /
    • pp.595-602
    • /
    • 2003
  • This study was carried out to investigate the status of the utilization of internet and dietary information by elementary school dietitians (total = 201) The results were summarized as follows: All subjects used the internet regularly and the major purpose they mentioned for using it was ″data search″ (72.3%). Those having a frequency of using the internet 6 to 7 times per week were 46.7% of the subjects and the majority indicated the duration of their use of the internet was ″〈 2 hours″ (68.5%). They mainly used the internet at ″school″ (81.8%) , and their favorite search engines were ″Daum″ (41.1%) and ″Yahoo″ (34.7%). They stated that the organization that offered reliable internet information were those ″related to society and organizations″ (36.9%) and ″educational institutions″ (33.8%). Ninety-five percent of the subjects searched for dietary information mainly ″for public affairs″ (80.0%) Their degree of satisfaction when searching for information was high (78.7%). Those dissatisfied with internet sites when searching for dietary information give the following reasons: ″poor information″ (39.1%) and ″slow updates″ (25.4%). They acquired information on nutrition and health management mainly through ″the internet″ (63.6%) The most frequently requested information about public affairs was on ″Materials for nutritional education″ (38.6%) and ″up-to-date nutritional information″ (16.0%) . The desirable update periods for websites was ″1 -3 months″ (51.8%) and ″ < 1 month″ (30.6%), and the favorite site colors were ″blue″ (37.8%) and ″green″ (37.8%). The results of this study showed that, although the internet usage was high, the dietitians were dissatisfied with the information obtained. Therefore, the information donors should find out what kind of dietary information is needed by elementary school dietitians. (Korean J Community Nutrition 8(4) : 595-602, 2003)

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

A Comparative Study on the Information Use Patterns of Science & Technology Researchers (과학기술 연구자 정보이용행태에 관한 비교 탐색 연구)

  • Choi, Woo-Seok;Yang, Dong-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.1946-1952
    • /
    • 2014
  • The purpose of this study is to suggest some improvements of information service on the Internet through a comparative analysis of information use patterns of science and technology researchers in universities, research institutes and business enterprises. We classify information use patterns into information use purpose, information use types, a frequently used/referenced portal site, the initial method of internet search, information service selection factors and the channels of off-line information acquisition. The results of this study are as follows: First, according to frequency analysis, there are some information use patterns among S & T research groups. Second, according to ${\chi}^2$ analysis, there are some significant differences in ratio of information use patterns among them.