• Title/Summary/Keyword: Ubiquitous based test

Search Result 139, Processing Time 0.024 seconds

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

Adenosine Kinase Inhibitor Design Based on Pharmacophore Modeling

  • Lee, Yun-O;Bharatham, Nagakumar;Bharatham, Kavitha;Lee, Keun-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.4
    • /
    • pp.561-566
    • /
    • 2007
  • Adenosine kinase (AK) is a ubiquitous intracellular enzyme, which catalyzes the phosphorylation of adenosine (ADO) to adenosine monophosphate (AMP). AK inhibitors have therapeutic potential as analgesic and antiinflammatory agents. A chemical feature based pharmacophore model has been generated from known AK inhibitors (26 training set compounds) by HypoGen module implemented in CATALYST software. The top ranked hypothesis (Hypo1) contained four features of two hydrogen-bond acceptors (HBA) and two hydrophobic aromatics (Z). Hypo1 was validated by 124 test set molecules with a correlation coefficient of 0.905 between experimental and estimated activity. It was also validated by CatScramble method. Thus, the Hypo1 was exploited for searching new lead compounds over 238,819 chemical compounds in NCI database and then the selected compounds were screened based on restriction estimated activity and Lipinski's rules to evaluate their drug-like properties. Finally we could obtain 72 new lead candidates and the two best compound structures from them were posted.

Development and Usability Test of Baby Vest Prototypes with a Body Temperature Sensing Function

  • Yi, Kyong-Hwa;Song, Hayoung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.3
    • /
    • pp.427-440
    • /
    • 2020
  • This study developed a vest prototype capable of monitoring body temperature using textile electrodes to prevent the sudden death of babies as well as to determine the quality of developed products by evaluating usability with commercial products. Based on the results of the 7th Size Korea Project, a basic pattern for a vest prototype was drafted by applying the average size of two-year-old Korean babies. Two prototypes were the detachable (VEST I) and integrated textile electrodes vest type (VEST II), which followed the same design. The materials were 100% cotton single jersey (SJ) and double jersey (DJ). Six experts evaluated the usability of the developed vests (VEST I & VEST II) and commercial product (VEST M). The single-layer woven textile electrode appeared to have a slightly higher conductivity than the double-layer one. There was no statistical difference in the body temperature sensing function between VEST I and VEST II. Finally, the superiority of the VEST I was verified through a comparison with commercial products (VEST M). The usability test suggested that a wearable smart clothing system of the integrated conductive textile could be further commercialized for bio-monitor applications in Ubiquitous-health care.

Internetworking Models Between Wireless Sensor Networks and the Internet Based on IPv6 (무선 센서 네트워크와 IPv6 기반 인터넷 간의 연동 모델)

  • Kwon, Hoon;Kim, Jeong-Hee;Kwak, Ho-Young;Do, Yang-Hoi;Kim, Dae-Young;Kim, Do-Hyeun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.11
    • /
    • pp.1474-1482
    • /
    • 2006
  • Recently, it is advanced about the variable research of IPv6 and the wireless sensor network. However, the existed researches are not enough about the internetworking technology between the wireless sensor network and the Internet based on IPv6 for supporting ubiquitous service. Accordingly, this paper proposes two internetworking models for connecting the wireless sensor network and Internet based on IPv6. The relay router in the first model and the sink node of the wireless sensor network in the second mode] were used as a gateway. Then we analyze and compare with two internetworking models. Additionally we construct the test-bed connected between the wireless sensor network and KOREN(KOrea advanced REsearch Network) based on IPv6 using the first model. And we verified the operation of the test-bed by experiments.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Development of a Prototype System for Slope Failure Monitoring Based on USN Technology (USN 기술을 이용한 사면붕괴모니터링 시범시스템 개발)

  • Han, Jae-Goo;Kim, Kyoon-Tai
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.316-321
    • /
    • 2007
  • The casualties due to slope failures such as landslide, rock fall, debris flow etc. are about 24% in total casualties caused by natural disasters for the last 10 years. And these slope failures are focused in the season in which typhoon and torrential rain take place. Not much attention, however, have been put into landslide mitigation research. Meanwhile, USN(Ubiquitous Sensor Network) forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability. Accordingly, USN is embossed a social point technology. The objective of this paper is to develop a prototype system for slope failure monitoring using USN technology. For this we develop module that collects and change slope movement data measured by two tiltermeter and a tension wire, store transferred data in database. Also we develop application program that can easily analyze the data. We apply the prototype system to a test site at KICT for testing and analyzing the system's performance.

  • PDF

A Study of Gate Control System Using RFID (RFID를 이용한 출입문 제어 시스템 연구)

  • Kang, Sung-Chul;Kim, Hyung-Chan;Doh, Yang-Hoi;Lee, Kwang-Man;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1505-1512
    • /
    • 2007
  • The RFID Technology (which is importantly used at the Ubiquitous environment) is attached to all of the units like the ID cards and then information on the units and units' environment is transferred and processed through the radio frequency. so it is the no touched recognition system. RFID Technology's research of the middle ware and wireless interface etc. is currently conducted and variously broaden like the industry of the distribution and logistics. This paper suggests that the gate control system which is based on RFID middle ware is realized to prevent the district and facility for security. The indication of this paper is that algorithm (which is to certificate Users' enterance through RFID EPC code) is proposed and realizes the user certification module, the control module of the gates' opening and closing, the maintenance module of the gate, the display module of coming and going information, test program ect. through RFID technology.

  • PDF

Emotion Recognition Based on Facial Expression by using Context-Sensitive Bayesian Classifier (상황에 민감한 베이지안 분류기를 이용한 얼굴 표정 기반의 감정 인식)

  • Kim, Jin-Ok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.7 s.110
    • /
    • pp.653-662
    • /
    • 2006
  • In ubiquitous computing that is to build computing environments to provide proper services according to user's context, human being's emotion recognition based on facial expression is used as essential means of HCI in order to make man-machine interaction more efficient and to do user's context-awareness. This paper addresses a problem of rigidly basic emotion recognition in context-sensitive facial expressions through a new Bayesian classifier. The task for emotion recognition of facial expressions consists of two steps, where the extraction step of facial feature is based on a color-histogram method and the classification step employs a new Bayesian teaming algorithm in performing efficient training and test. New context-sensitive Bayesian learning algorithm of EADF(Extended Assumed-Density Filtering) is proposed to recognize more exact emotions as it utilizes different classifier complexities for different contexts. Experimental results show an expression classification accuracy of over 91% on the test database and achieve the error rate of 10.6% by modeling facial expression as hidden context.

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.