• Title/Summary/Keyword: Recording devices

Search Result 156, Processing Time 0.023 seconds

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Analysis of Phenological Changes by Phenocams on Some Major Species Distributed in Wetland and Forest Ecosystems in Korea (Phenocam을 활용한 국내 습지 및 산림생태계 대표 수종의 계절적 변화 분석)

  • Minki Hong;Hyohyemi Lee;Jeong-Soo Park
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.226-236
    • /
    • 2023
  • As climate change intensifies, the importance of studying plant phenology has increased, leading to a surge in research employing automated video recording devices like Phenocams. In this study, using the Phenocams operated by the National Institute of Ecology, we examined the trends in plant phenological changes across diverse ecosystem types in South Korea and analyzed their correlations with climate factors. The patterns of plant phenological changes varied by region and tree species. Pinus thunbergii and Pinus densiflora typically show an overall increase in their growth period, positively correlating with temperatures and precipitation during winter. However, uniquely, for Abies koreana on Hallasan Mt., a higher amount of precipitation in August leads to an earlier end of season (eos), and the correlation analysis with the recent phenomenon of dying A. Koreana seems necessary. beyond the analysis, solutions for handling missing data issues during the data collection process were proposed. Furthermore, to expand future research scope and encompass diverse ecosystem types, a suggestion to combine Phenocam research with satellite observations was presented.

Configurable Smart Contracts Automation for EVM based Blockchains

  • ZAIN UL ABEDIN;Muhammad Shujat Ali;Ashraf Ali;Sana Ejaz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.147-156
    • /
    • 2023
  • Electronic voting machines (EVMs) are replacing research ballots due to the errors involved in the manual counting process and the lengthy time required to count the votes. Even though these digital recording electronic systems are advancements, they are vulnerable to tampering and electoral fraud. The suspected vulnerabilities in EVMs are the possibility of tampering with the EVM's memory chip or replacing it with a fake one, their simplicity, which allows them to be tampered with without requiring much skill, and the possibility of double voting. The vote data is shared among all network devices, and peer-to-peer verification is performed to ensure the vote data's authenticity. To successfully tamper with the system, all of the data stored in the nodes must be changed. This improves the proposed system's efficiency and dependability. Elections and voting are fundamental components of a democratic system. Various attempts have been made to make modern elections more flexible by utilizing digital technologies. The fundamental characteristics of free and fair elections are intractability, immutability, transparency, and the privacy of the actors involved. This corresponds to a few of the many characteristics of blockchain-like decentralized ownership, such as chain immutability, anonymity, and distributed ledger. This working research attempts to conduct a comparative analysis of various blockchain technologies in development and propose a 'Blockchain-based Electronic Voting System' solution by weighing these technologies based on the need for the proposed solution. The primary goal of this research is to present a robust blockchain-based election mechanism that is not only reliable but also adaptable to current needs.

Implementation of AESA Radar Integration Analysis System by using Heterogeneous Media

  • Min-Jung Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.117-125
    • /
    • 2024
  • In this paper, implement and propose an Active Electronically Scanned Array (AESA) radar integration analysis system which specialized for radar development by using heterogeneous media. Most analysis systems are used to analyze and improve the cause of defects, so they help the test easier. However, previous log analysis systems that operate only based on text are not intuitive and difficult to find the information user want at once if there is a lot of log information. so when an equipment defect occurs, there are limitations in analyzing the cause of defect. Therefore, the analysis system in this paper utilizes heterogeneous media. The media defined in this paper refers to recording text-based data, displaying data as image or video and visualizing data. The proposed analysis system classifies and stores data that transmitted and received between radar devices, radar target detection and Tracking algorithm data, etc. also displays and visualizes radar operation results and equipment defect information in real time. With this analysis system, it can quickly provide information what user want and assistance in developing high quality radar.

Comparison and Evaluation of Data Collection System Database for Edge-Based Lightweight Platform (엣지 기반 경량화 플랫폼을 위한 데이터 수집 시스템의 데이터베이스 비교 및 평가)

  • Woojin Cho;Chae-young Lim;Jae-hoi Gu
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.49-58
    • /
    • 2023
  • Factory energy management system is rapidly growing and evolving due to factors such as the 3rd Basic Energy Plan and global energy cost increases, as well as environmental issues. However, implementing an essential data collection system for energy management in factory settings, which have limited space and unique characteristics, presents spatial, environmental, and energy-related challenges. This paper endeavors to mitigate these challenges by devising a data collection system implemented through an edge-based lightweight platform. A comparison and evaluation of database operation on edge devices are conducted. To conduct the evaluation, a benchmarking tool called CDI Benchmark is developed, utilizing the characteristics of existing factories involved in practical applications. The evaluation results revealed that RDBMS systems like MySQL encountered errors in the database due to high data insertion loads, making them inoperable. On the other hand, InfluxDB, thanks to its highly efficient compression algorithm, demonstrated compression rates about 6 times higher than MyRocks according to the evaluation. However, it was observed that MyRocks outperformed InfluxDB by a significant margin, recording a maximum processing time approximately 80 times faster compared to InfluxDB.

  • PDF

A Study on Physical Activity by Transportation Mode Using Heart Rate (심박수를 활용한 교통수단별 신체활동 정보 분석 연구)

  • Jeong, Eunbi;You, Soyoung Iris;Yu, Seung Min
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.4
    • /
    • pp.100-115
    • /
    • 2020
  • Recently, with the development of various sensors and communication technologies, the market for wearable devices capable of recording physical activity in connection with a smartphone is expanding. The purpose of this study is to analyze physical activity for each transportation modes in order to utilize wearable devices in the field of transportation. This study consists of three steps: data collection, basic statistical analysis, and physical activity analysis. Four adult males and females were recruited as investigators, and physical activity and route information were collected through Fitbit, a commercial wearable device. From the collected physical activity information, a percentage of heart rate reserve (%HRR) using a heart rate was derived and used for analysis. As a results, it was found that there is a statistically significant difference in heart rate for each transportation mode, and physical activity intensity is the highest when walking. In addition, the results of physical activity analysis for the case of using different routes for the same OD were presented. The results presented in this study are expected to be used as basic data for preparing public transportation activation policies and providing customized services for the future.

Physical Restraints Use and Associated Factors Among Elderly Patients in Long-term Care Hospitals (요양병원 재원 노인의 신체적 억제대 사용과 관련 요인)

  • Ko, Yeong Ju;Ha, Sun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.167-174
    • /
    • 2019
  • The propose od this study was to examine the extent of using physical restraint on elderly patients (over 65 years old) and who were patients in long-term care hospitals. The data was collected, from March 3 2018 to March 29 2018, from the electronic nursing records by using a recording tool, and clinical observation was also used for assessing the use of physical restraint and the related factors. Descriptive statistics, Pearson correlation coefficients and logistic regression were then performed. The usage rate for physical restraints in long-term care hospital was 83.7%, and the most common type of physical restraint was side rails. The use of physical restraints showed a positive correlation with the fall risk scores and a negative correlation with the MMSE. Logistic regression analysis showed that the Fall Risk Score (OR=1.02, 95% CI=1.01~1.03), MMSE (OR=0.94, CI=0.88~0.99) and the use of medical devices (OR=0.80, 95% CI=0.65~0.98) were related with using physical restraints. Therefore, it was confirmed that physical restraint was used in cases of a high risk of falling, severe cognitive impairment and the use of complex and fragile medical devices to treat the patient. Clinical nursing practice should be changed so that treatment alternatives can be applied for elderly patients rather than using too many physical restraints.

Network Performance Verification for Next-Generation Power Distribution Management System Using FRTU Simulator (FRTU 시뮬레이터를 이용한 차세대 배전지능화시스템 네트워크 성능검증)

  • Yeo, Sang-Uk;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.523-529
    • /
    • 2020
  • Power distribution management system is essential for the efficient management and operation of power distribution networks. The power distribution system is a system that manages the distribution network based on IT, and has been evolving along with the development of the power industry. The current power distribution system is designed to operate at a relatively low network transmission speed based on the independent operation of the main equipment. However, due to distributed resources such as photovoltaic or energy storage devices, which are rapidly increasing in popularity in recent years, the operation of future distribution environments is becoming more complex, and various information needs to be collected in real time. In this study, the requirements of the next-generation power distribution system were derived to overcome the limitations of the existing power distribution system, and based on this, the communication network system and performance requirements for the distribution system were defined. In order to verify the performance of the designed system, a software-based terminal device simulator was developed because it takes excessive time and cost to introduce a large-scale system such as a power distribution system. Using the simulator, a test environment similar to the actual operation was established, and the number of terminal devices was increased up to 1,000. The proposed system was shown to satisfy the requirements to support the functions of the next-generation power distribution system, recording less than 10 % of the communication network bandwidth.

A Comparison of Bioacoustic Recording and Field Survey as Bird Survey Methods - In Dongbaek-dongsan and 1100-altitude Wetland of Jeju Island - (조류 조사 방법으로써 생물음향 녹음과 현장 조사의 비교 - 제주 동백동산과 1100고지 습지를 대상으로 -)

  • Se-Jun Choi;Kyong-Seok Ki
    • Korean Journal of Environment and Ecology
    • /
    • v.37 no.5
    • /
    • pp.327-336
    • /
    • 2023
  • This study aimed to propose an effective method for surveying wild birds by comparing the results of bioacoustic detection with those obtained through a field survey. The study sites were located at Dongbaek-dongsan and a 1100-altitude wetland in Jeju-do, South Korea. The bioacoustic detection was conducted over the course of 12 months in 2020. For the bioacoustic detection, a Song-meter SM4 device was installed at each study site, recording bird songs in 1-min per hour, .wav, and 44,100 Hz format. The findings of the field survey were taken from the 「Long-term trends of Bird Community at Dongbaekdongsan and 1100-Highland Wetland of Jeju Island, South Korea.」 by Banjade et al. (2019). The results of this study are as follows. First, the avifauna identified using bioacoustic detection comprised 29 families and 46 species in Dongbaek-dongsan, and 16 families and 25 species in the 1100-altitude wetland. Second, based on the song frequency, the dominant species in Dongbaek-dongsan were Hypsipetes amaurotis (Brown-eared Bulbul, 33.62%), Horornis diphone (Japanese Bush Warbler, 12.13%), and Zosterops japonicus (Warbling White-eye, 9.77%). In the 1100-altitude wetland the dominant species were Corvus macrorhynchos (Large-billed Crow, 27.34%), H. diphone (19.43%), and H. amaurotis (16.56%). Third, in the field survey conducted at Dongbaek-dongsan, the number of detected bird species was 39 in 2009, 51 in 2012, 35 in 2015, and 45 in 2018, while the bioacoustic detection identified 46 species. In the field survey conducted in the 1100-altitude wetland, the number of detected bird species was 37 in 2009, 42 in 2012, 34 in 2015, and 38 in 2018, while the bioacoustics detection identified 25 species. Overall, 43.6% of the 78 species detected in the field survey in Dongbaek-dongsan (34 species) were identified using bioacoustic detection, and 38.3% of the 47 species detected in the field survey in the 1100-altitude wetland (18 species) were identified using bioacoustic detection. Fourth, the bioacoustic detection identified 9 families and 12 species of birds in Dongbaek-dongsan, and 3 families and 7 species of birds in the 1100-altitude wetland. No results from field survey were available for these species. The identified birds were predominantly nocturnal, including Otus sunia (Oriental Scops Owl) and Ninox japonica (Northern Boobook), passage migrants, including Larvivora cyane (Siberian Blue Robin), L. sibilans (Rufous-tailed Robin), and winter visitors with a relatively small number of visiting individuals, such as Bombycilla garrulus (Bohemian Waxwing) and Loxia curvirostra (Red Crossbill). Fifth, the birds detected in the field survey but not through bioacoustic detection included 18 families and 48 species in Dongbaek-dongsan and 14 families and 27 species in the 1100-altitude wetland; the most representative families were Ardeidae, Accipitridae, and Muscicapidae. This study is significant as it provides essential data supporting the possibility of an effective survey combining bioacoustic detection with field studies, given the increasing use of bioacoustic devices in ornithological studies in South Korea.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.