• Title/Summary/Keyword: Issue Detection

Search Result 595, Processing Time 0.033 seconds

Efficient Flash Memory Access Power Reduction Techniques for IoT-Driven Rare-Event Logging Application (IoT 기반 간헐적 이벤트 로깅 응용에 최적화된 효율적 플래시 메모리 전력 소모 감소기법)

  • Kwon, Jisu;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.2
    • /
    • pp.87-96
    • /
    • 2019
  • Low power issue is one of the most critical problems in the Internet of Things (IoT), which are powered by battery. To solve this problem, various approaches have been presented so far. In this paper, we propose a method to reduce the power consumption by reducing the numbers of accesses into the flash memory consuming a large amount of power for on-chip software execution. Our approach is based on using cooperative logging structure to distribute the sampling overhead in single sensor node to adjacent nodes in case of rare-event applications. The proposed algorithm to identify event occurrence is newly introduced with negative feedback method by observing difference between past data and recent data coming from the sensor. When an event with need of flash access is determined, the proposed approach only allows access to write the sampled data in flash memory. The proposed event detection algorithm (EDA) result in 30% reduction of power consumption compared to the conventional flash write scheme for all cases of event. The sampled data from the sensor is first traced into the random access memory (RAM), and write access to the flash memory is delayed until the page buffer of the on-chip flash memory controller in the micro controller unit (MCU) is full of the numbers of the traced data, thereby reducing the frequency of accessing flash memory. This technique additionally reduces power consumption by 40% compared to flash-write all data. By sharing the sampling information via LoRa channel, the overhead in sampling data is distributed, to reduce the sampling load on each node, so that the 66% reduction of total power consumption is achieved in several IoT edge nodes by removing the sampling operation of duplicated data.

Using multiple sequence alignment to extract daily activity routines of the elderly living alone

  • Lee, Bogyeong;Lee, Hyun-Soo;Park, Moonseo;Ahn, Changbum Ryan;Choi, Nakjung;Kim, Toseung
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.73-90
    • /
    • 2019
  • The growth in the number of single-member households is a critical issue worldwide, especially among the elderly. For those living alone, who may be unaware of their health status or routines that could improve their health, a continuous healthcare monitoring system could provide valuable feedback. Assessing the performance adequacy of activities of daily living (ADL) can serve as a measure of an individual's health status; previous research has focused on determining a person's daily activities and extracting the most frequently performed behavioral patterns using camera recordings or wearable sensing techniques. However, existing methods used to extract common patterns of an occupant's activities in the home fail to address the spatio-temporal dimensions of human activities simultaneously. Though multiple sequence alignment (MSA) offers some advantages - such as inherent containment of the spatio-temporal data in sequence format, and rapid identification of hidden patterns - MSA has rarely been used to extract in-home ADL routines. This research proposes a method to extract a household occupant's ADL routines from a cumulative spatio-temporal data log of occupancy collected using a non-intrusive method (i.e., a tomographic motion detection system). The findings from an occupant's 28-day spatio-temporal activity log demonstrate the capacity of the proposed approach to identify routine patterns of an occupant's daily activities and to reveal the order, duration, and frequency of routine activities. Routine ADL patterns identified from the proposed approach are expected to provide a basis for detecting/evaluating abrupt or gradual changes of an occupant's ADL patterns that result from a physical or mental disorder, and can offer valuable information for home automation applications by enabling the prediction of ADL patterns.

A Study on the Smart Care System Using Real-time Object Tracking Technology (실시간 객체 추적 기술을 활용한 스마트 케어 시스템에 대한 연구)

  • Kim, HyeJeong;Kang, MinGu;Lee, HyeGyu;Ko, Dongbeom;Kim, JeongJoon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.243-250
    • /
    • 2018
  • This paper designs and implements a smart care system for the senior citizen who lives alone. Recently, as the level of living has increased due to the rapid improvement of medicine, living standard and environment, the proportion of the elderly population is increasing. In addition, the proportion of the elderly living alone, which is increasing with the aging society, suggests that the provision of services such as the elder care system and emergency notification is becoming an important issue. However, since the existing emergency notification technology analyzes fixed CCTV images, it is difficult to monitor in the blind spot of CCTV and to move to a place where the camera is not installed. There is a problem that it can not be performed. Therefore, in this paper, we design and develop a smart care system that utilizes robot and object tracking technology that can move in real time to overcome these shortcomings. This enables real-time monitoring regardless of the location, and prompts for assistance in case of an emergency, so that it can provide convenience to cares and assistants.

Improvement of KOMPSAT-5 Image Resolution for Target Analysis (객체 분석을 위한 KOMPSAT-5 영상의 해상도 향상 성능 분석)

  • Lee, Seung-Jae;Chae, Tae-Byeong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.4
    • /
    • pp.275-281
    • /
    • 2019
  • A synthetic aperture radar(SAR) satellite is more effective than an optical satellite for target analysis because an SAR satellite can provide two-dimensional electromagnetic scattering distribution of a target during all-weather and day-and-night operations. To conduct target analysis while considering the earth observation interval of an SAR satellite, observing a specific area as wide as possible would be advantageous. However, wider the observation area, worse is the resolution of the associated SAR satellite image. Although conventional methods for improving the resolution of radar images can be employed for addressing this issue, few studies have been conducted for improving the resolution of SAR satellite images and analyzing the performance. Hence, in this study, the applicability of conventional methods to SAR satellite images is investigated. SAR target detection was first applied to Korea Multipurpose Satellite-5(KOMPSAT-5) SAR images provided by Korea Aerospace Research Institute for extracting target responses. Extrapolation, RELAX, and MUSIC algorithms were subsequently applied to the target responses for improving the resolution, and the corresponding performance was thereby analyzed.

Thermal Signature Characteristics of Clothed Human Considering Thermoregulation Effects (체온 조절 작용을 고려한 의복 착용 시의 인체 열상신호 특성 분석)

  • Chang, Injoong;Bae, Ji-Yeul;Lee, Namkyu;Kwak, Hwykuen;Cho, Hyung Hee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.2
    • /
    • pp.109-116
    • /
    • 2019
  • Survivability of soldiers has been greatly threatened by the development of thermal observation device(TOD). Therefore, infrared, especially thermal, stealth technology is applied to combat suit to avoid detection from TOD. In this study, prior to the thermal camouflage performance evaluation of combat suit, thermal signature characteristic from clothed the human body was analyzed considering the realistic condition for human surface temperature compared to that from unclothed human body. To get the realistic surface temperature distribution of human, thermoregulation and multi-layer skin structure model is applied to the human model. Based on temperature distribution, surface diffuse radiance in thermal range is calculated and by assuming the background conditions, contrast radiance intensity(CRI) characteristic of human body is analyzed. By wearing clothing, the CRI between background and human body became reduced in low emissive background but in high emissive background, the contrast is much more prominent. Therefore, this issue should be considered in design process of thermal camouflage combat suit.

A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services (국가 전산망 보안관제업무의 효율적 수행방안에 관한 연구)

  • Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. As a result, the monitoring and control of cyber security, which enables attack detection, analysis and response on a real-time basis has become of paramount importance. This paper discusses how to improve efficiency and effectiveness of national cyber security monitoring and control services. It first reviews major threats to the public communications network and how the responses to these threats are made and then it proposes a new approach to improve the national cyber security monitoring and control services.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization (반가상화 환경 Guest OS 보호를 위한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Shin, Seung-Hun;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.659-666
    • /
    • 2012
  • Recently, cloud computing service has become a rising issue in terms of utilizing sources more efficiently and saving costs. However, the service still has some limitations to be popularized because it lacks the verification towards security safety. In particular, the possibility to induce Denial of service is increasing as it is used as Zombie PC with exposure to security weakness of Guest OS's. This paper suggests how cloud system, which is implemented by Xen, detects intrusion caused by Denial of service using hypercall. Through the experiment, the method suggested by K-means and EM shows that two data, collected for 2 mins, 5 mins, 10mins and 20mins each, are distinguished 90% when collected for 2mins and 5mins while collected over 10mins are distinguished 100% successfully.

Current Status of Application of KOMPSAT Series (최근 다목적실용위성 시리즈 활용 현황)

  • Lee, Kwang-Jae;Oh, Kwan-Young;Lee, Won-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.6_2
    • /
    • pp.1485-1492
    • /
    • 2020
  • It has been more than 20 years since the launch of KOMPSAT-1, and so far, a total of 5 satellites have been successfully launched. Until now, KOMPSAT has been used in various fields, including the production of various thematic maps, land change, environmental analysis, and marine monitoring. Many researchers have conducted research to process, analyze, and utilize KOMPSAT images. According to the national space development plan, the KOMPSAT series will be continuously developed to meet the demand for satellite images at the national level. If the ultimate purpose of satellite development is to utilize acquired images, systematic research to effectively utilize the developed satellites should be followed. This special issue introduces the recently conducted research on the use of KOMPSAT images.

IoT-based Architecture and Implementation for Automatic Shock Treatment

  • Lee, Namhwa;Jeong, Minsu;Kim, Youngjae;Shin, Jisoo;Joe, Inwhee;Jeon, Sanghoon;Ko, Byuk Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2209-2224
    • /
    • 2022
  • The Internet of Things (IoT) is being used in a wide variety of fields due to the recent 4th industrial revolution. In particular, research is being conducted that combines IoT with the medical field such as telemedicine. Among them, the field of shock detection is a big issue in the medical field because the causes of shock are diverse, treatments are very complex, and require a high level of medical knowledge and experience. The transmission of infectious diseases is common when treating critically ill patients, especially patients with shock. Thus, to effectively care for shock patients, we propose an architecture that continuously monitors the patient's condition, and automatically recommends a drug injection treatment according to the patient's shock condition. The patient's hemodynamic information is continuously monitored, and the patient's shock generation information is recorded periodically. With the recorded patient information, the patient's condition is determined and automatically injected with necessary medication. The medical team can find out whether the patient's condition has improved by checking the recorded information through web applications. The study can help relieve the shortage of medical personnel and help prevent transmission of infectious disease in medical staff. We look forward to playing a role in helping medical staff by making recommendations for the diagnosis and treatment of complex and difficult shocks.