• Title/Summary/Keyword: Technological Requirements

Search Result 203, Processing Time 0.027 seconds

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

Hydrogen Fuel Cell Patent Analysis: Using Knowledge Persistence-based Main Path Analysis and Text Mining (수소연료전지 특허 동향 분석: 지식 지속성 기반 주경로 분석 및 텍스트 마이닝 방법 활용)

  • Sejun Yoon;Hyunseok Park
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.127-145
    • /
    • 2023
  • This paper analyzed a patent trend for technological domain of hydrogen fuel cell, can improve future energy and pollution problems. Patent analysis is used in establishing a technological roadmap which it can discover the current technology capability and future technological development direction. However, the previous patent analysis is qualitative analysis and simple statistical analysis. The reason why it incorrectly analysis patent does not reflect the current technology environment. The current technology environment is development through recombination of technologies. In addition to, the speed of technological development is rapidly growing. So, qualitative analysis does not satisfy the analysis requirements of the times. This paper utilized KP(Knowledge Persistence)-based main path analysis and text mining methods to reflect the current technological environment. As a result, we found core patents, main technology development, and promising technologies for technological domain of the hydrogen fuel cell.

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

A Study on the Concept of Human Factors in Ship Operating System (선박운항시스템에 있어서 인적요소(Human Factors)의 개념에 관한 고찰)

  • 황병호;이종인
    • Journal of the Korean Institute of Navigation
    • /
    • v.23 no.4
    • /
    • pp.29-42
    • /
    • 1999
  • In the recent past, maritime safety research has been applied primarily to technological requirements and progression of regulations on standards of safety from which the ISM Code has resulted. Despite the engineering and technological innovations, significant marine casualties continue to occur, which indicates that human factors are an area requiring more focused attention. This paper aims to study the clear concept and its details of human factors in ship operating system through the investigation of researches presented so far. The purpose of studying human factors is to identify how the crew, the owners, the classification societies, and the regulatory bodies can work together to sever the chain of errors which are associated with every marine casualty. The human factors in ship operating system may be defined as the study and analysis of the interaction between the operator and system variables composing the system, most importantly the procedures and the crew and management follow.

  • PDF

MAC layer based cross-layer solutions for VANET routing: A review

  • Nigam, Ujjwal;Silakari, Sanjay
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.636-642
    • /
    • 2021
  • Vehicular Ad hoc Networks (VANET's) are gaining popularity in research community with every passing year due to the key role they play in Intelligent Transportation System. Their primary objective is to provide safety, but their potential to offer a variety of user-oriented services makes them more attractive. The biggest challenge in providing all these services is the inherent characteristics of VANET itself such as highly dynamic topology due to which maintaining continuous communication among vehicles is extremely difficult. Here comes the importance of routing solutions which traditionally are designed using strict layered architecture but fail to address stringent QoS requirements. The paradigm of cross-layer design for routing has shown remarkable performance improvements. This paper aims to highlight routing challenges in VANET, limitations of single-layer solutions and presents a survey of cross-layer routing solutions that utilize the information from the MAC layer to improve routing performance in VANET.

The Metaverse in Construction: Foundations, Frameworks, and Potentials

  • Akeem Pedro;Mehrtash Soltani;Rahat Hussain;Chansik Park
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.599-605
    • /
    • 2024
  • In an era marked by rapid technological advancements, the term "metaverse" has emerged at the forefront of discussions, yet its conceptualization remains nebulous, especially in specialized domains such as construction. The metaverse represents an interconnected digital realm where physical and virtual realities converge, enabling transformative experiences and collaborations. This study seeks to disambiguate the notion of the metaverse, particularly contextualizing it within the construction industry's paradigm. By juxtaposing the metaverse with existing technologies like Building Information Modeling (BIM) and digital twins, this paper elucidates the unique technological components that would define a construction-centric metaverse. This paper highlights precepts and requirements for a construction domain metaverse. Potential applications of the metaverse within construction settings are explored, offering practitioners insights into avenues for research and development. This research aims to offer a guide for industry professionals, technologists, and researchers, providing clarity on harnessing the metaverse's capabilities effectively and setting the foundation for its meaningful integration in construction endeavors.

Dental Impression Measurement Based on an Adaptive Measuring Process Plan (적응형 측정계획 기반 치과인상 측정)

  • Park, Sang Chul;Chung, Yong Ho;Hwam, Won Kyung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.4
    • /
    • pp.283-289
    • /
    • 2013
  • Presented in this paper is an adaptive measuring procedure of dental impression using the Structured Light System. While measuring a complex object, such as dental impression, in the reverse engineering, it is not possible to acquire all parts of the scanned surface. Missing scanned data is resulted in holes in a created triangular mesh. The focus of this paper is to introduce an algorithm for automatic identification of additional scanning orientations to fill holes that are created by a default scan. The proposed algorithm was developed by the three major technological requirements: camera visibility, projector visibility, data reliability. In order to satisfy the requirements, the proposed algorithm determines additional scanning orientation from the orientation of a projection plane derived from the average normal vector of boundary triangles.

Trends of High Speed Satellite Offline Telemetry Processing (위성 상태 데이터의 고속 후처리 기술 동향)

  • Kang, Ji-Hoon;Koo, In-Hoi;Ahn, Sang-Il
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.8 no.2
    • /
    • pp.15-23
    • /
    • 2010
  • In this paper, the trends of a satellite offline telemetry processing system had been discussed. The satellite offline telemetry processing system is used to analyze an offline telemetry and to check health status of the satellite. Common requirements for the system are high speed processing, processed data visualization, easiness of use, and generality. Regarding to these requirements, how the recent telemetry processing system had been designed and implemented is discussed in detail.

  • PDF

A DESIGN OF INTERSECTION COLLISION AVOIDANCE SYSTEM BASED ON UBIQUITOUS SENSOR NETWORKS

  • Kim, Min-Soo;Lee, Eun-Kyu;Jang, Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.749-752
    • /
    • 2005
  • In this paper, we introduce an Intersection Collision Avoidance (ICA) system as a convergence example of Telematics and USN technology and show several requirements for the ICA system. Also, we propose a system design that satisfies the requirements of reliable vehicular data acquisition, real-time data transmission, and effective intersection collision prediction. The ICA system consists of vehicles, sensor nodes and a base station that can provide drivers with a reliable ICA service. Then, we propose several technological solutions needed when implementing the ICA system. Those are about sensor nodes deployment, vehicular information transmission, vehicular location data acquisition, and intersection collision prediction methods. We expect this system will be a good case study applied to real Telematics application based on USN technology.

  • PDF