• Title/Summary/Keyword: security visualization

Search Result 137, Processing Time 0.023 seconds

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

Integrated Power Optimization with Battery Friendly Algorithm in Wireless Capsule Endoscopy

  • Mehmood, Tariq;Naeem, Nadeem;Parveen, Sajida
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.338-344
    • /
    • 2021
  • The recently continuous enhancement and development in the biomedical side for the betterment of human life. The Wireless Body Area Networks is a significant tool for the current researcher to design and transfer data with greater data rates among the sensors and sensor nodes for biomedical applications. The core area for research in WBANs is power efficiency, battery-driven devices for health and medical, the Charging limitation is a major and serious problem for the WBANs.this research work is proposed to find out the optimal solution for battery-friendly technology. In this research we have addressed the solution to increasing the battery lifetime with variable data transmission rates from medical equipment as Wireless Endoscopy Capsules, this device will analyze a patient's inner body gastrointestinal tract by capturing images and visualization at the workstation. The second major issue is that the Wireless Endoscopy Capsule based systems are currently not used for clinical applications due to their low data rate as well as low resolution and limited battery lifetime, in case of these devices are more enhanced in these cases it will be the best solution for the medical applications. The main objective of this research is to power optimization by reducing the power consumption of the battery in the Wireless Endoscopy Capsule to make it battery-friendly. To overcome the problem we have proposed the algorithm for "Battery Friendly Algorithm" and we have compared the different frame rates of buffer sizes for Transmissions. The proposed Battery Friendly Algorithm is to send the images on average frame rate instead of transmitting the images on maximum or minimum frame rates. The proposed algorithm extends the battery lifetime in comparison with the previous baseline proposed algorithm as well as increased the battery lifetime of the capsule.

A Data Analysis and Visualization of AI Ethics -Focusing on the interactive AI service 'Lee Luda'- (인공지능 윤리 인식에 대한 데이터 분석 및 시각화 연구 -대화형 인공지능 서비스 '이루다'를 중심으로-)

  • Lee, Su-Ryeon;Choi, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.269-275
    • /
    • 2022
  • As artificial intelligence services targeting humans increase, social demands are increasing that artificial intelligence should also be made on an ethical basis. Following this trend, the government and businesses are preparing policies and norms related to artificial intelligence ethics. In order to establish reasonable policies and norms, the first step is to understand the public's perceptions. In this paper, social data and news comments were collected and analyzed to understand the public's perception related to artificial intelligence and ethics. Interest analysis, emotional analysis, and discourse analysis were performed and visualized on the collected datasets. As a result of the analysis, interest in "artificial intelligence ethics" and "artificial intelligence" favorability showed an inversely proportional correlation. As a result of discourse analysis, the biggest issue was "personal information leakage," and it also showed a discourse on contamination and deflection of learning data and whether computer-made artificial intelligence should be given a legal personality. This study can be used as data to grasp the public's perception when preparing artificial intelligence ethical norms and policies.

Development of sound location visualization intelligent control system for using PM hearing impaired users (청각 장애인 PM 이용자를 위한 소리 위치 시각화 지능형 제어 시스템 개발)

  • Yong-Hyeon Jo;Jin Young Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.105-114
    • /
    • 2022
  • This paper is presents an intelligent control system that visualizes the direction of arrival for hearing impaired using personal mobility, and aims to recognize and prevent dangerous situations caused by sound such as alarm sounds and crack sounds on roads. The position estimation method of sound source uses a machine learning classification model characterized by generalized correlated phase transformation based on time difference of arrival. In the experimental environment reproducing the road situations, four classification models learned after extracting learning data according to wind speeds 0km/h, 5.8km/h, 14.2km/h, and 26.4km/h were compared with grid search cross validation, and the Muti-Layer Perceptron(MLP) model with the best performance was applied as the optimal algorithm. When wind occurred, the proposed algorithm showed an average performance improvement of 7.6-11.5% compared to the previous studies.

Multi-Behavior Analysis Based on Google Archiving Data (구글 아카이빙 데이터 기반 멀티 행위 분석)

  • Yeeun Kim;Sara Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.737-751
    • /
    • 2023
  • The importance of digital forensics in the cloud environment is increasing as businesses and individuals move their data from On-premise to the cloud. Cloud data can be stored on various devices, including mobile devices and desktops, and encompasses a variety of user behavior artifacts, such as information generated from linked accounts and cloud services. However, there are limitations in securing and analyzing digital evidence due to environmental constraints of the cloud, such as distributed storage of data and lack of artifact linkage. One solution to address this is archiving services, and Google's Takeout is prime example. In this paper, user behavior data is analyzed for cloud forensics based on archiving data and necessary items are selected from an investigation perspective. Additionally, we propose the process of analyzing selectively collected data based on time information and utilizing web-based visualization to meaningfully assess artifact associations and multi-behaviors. Through this, we aim to demonstrate the value of utilizing archiving data in response to the increasing significance of evidence collection for cloud data.

Application Study applied to the Encryption at Virtualization Launcher (가상화 런처에서 암호화를 적용한 어플리케이션 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.87-92
    • /
    • 2014
  • Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

Implementation of Digital Laser Welding Cell for Car Side Panel Assembly (차체 사이드 패널 조립을 위한 디지털 레이저용접 셀 구현)

  • Park Hong Seok;Choi Hung Won;Kang Mu Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.5 s.170
    • /
    • pp.113-120
    • /
    • 2005
  • Because of the turbulent markets and the increasing demand on product quality, the application of new technology to practice is increasingly important. In case of automotive industries, they take interest in laser welding to solve these problems because laser welding has many advantages such as good accessibility, welding quality, fast welding speed and so on. To apply this technology to welding of car body, the data of laser welding are collected through lots of the experiment according to the material, geometry and layer number of welding points. Based on the experiment results and the information of product, i.e. the car side panel, the clustering of stitches for laser welding was carried out and the optimal equipments are selected through the comparison between the requirements of welding and the potential of equipments. Using these results, laser welding cell for the car side panel are configured with the concept of the digital manufacturing, which ensures maximum planning security with visualization and simulation. Finally, the optimal laser welding cell is chosen by the evaluation of alternative cells with assessment criteria.

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

A 2D / 3D Map Modeling of Indoor Environment (실내환경에서의 2 차원/ 3 차원 Map Modeling 제작기법)

  • Jo, Sang-Woo;Park, Jin-Woo;Kwon, Yong-Moo;Ahn, Sang-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.355-361
    • /
    • 2006
  • In large scale environments like airport, museum, large warehouse and department store, autonomous mobile robots will play an important role in security and surveillance tasks. Robotic security guards will give the surveyed information of large scale environments and communicate with human operator with that kind of data such as if there is an object or not and a window is open. Both for visualization of information and as human machine interface for remote control, a 3D model can give much more useful information than the typical 2D maps used in many robotic applications today. It is easier to understandable and makes user feel like being in a location of robot so that user could interact with robot more naturally in a remote circumstance and see structures such as windows and doors that cannot be seen in a 2D model. In this paper we present our simple and easy to use method to obtain a 3D textured model. For expression of reality, we need to integrate the 3D models and real scenes. Most of other cases of 3D modeling method consist of two data acquisition devices. One for getting a 3D model and another for obtaining realistic textures. In this case, the former device would be 2D laser range-finder and the latter device would be common camera. Our algorithm consists of building a measurement-based 2D metric map which is acquired by laser range-finder, texture acquisition/stitching and texture-mapping to corresponding 3D model. The algorithm is implemented with laser sensor for obtaining 2D/3D metric map and two cameras for gathering texture. Our geometric 3D model consists of planes that model the floor and walls. The geometry of the planes is extracted from the 2D metric map data. Textures for the floor and walls are generated from the images captured by two 1394 cameras which have wide Field of View angle. Image stitching and image cutting process is used to generate textured images for corresponding with a 3D model. The algorithm is applied to 2 cases which are corridor and space that has the four wall like room of building. The generated 3D map model of indoor environment is shown with VRML format and can be viewed in a web browser with a VRML plug-in. The proposed algorithm can be applied to 3D model-based remote surveillance system through WWW.

  • PDF

Steep Slope Management System integrated with Realtime Monitoring Information into 3D Web GIS (상시계측센서정보와 3차원 Web GIS를 융합한 급경사지관리시스템)

  • Chung, Dong Ki;Sung, Jae Ryeol;Lee, Dong Wook;Chang, Ki Tae;Lee, Jin Duk
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.3
    • /
    • pp.9-17
    • /
    • 2013
  • Geospatial information data came recently in use to build the location-based service in various fields. These data were shown via a 2-D map in the past but now can be viewed as a 3-D map due to the dramatic evolution of IT technology, thus improving efficiency and raising practicality to a greater extent by providing a more realistic visualization of the field. In addition, many previous GIS applications have been provided under desktop environment, limiting access from remote sites and reducing its approachability for less experienced users. The latest trend offers service with web-based environment, providing efficient sharing of data to all users, both unknown and specific internal users. Therefore, real-time information sensors that have been installed on steep slopes are to be integrated with 3-D geospatial information in this study. It is also to be developed with web-based environment to improve usage and access. There are three steps taken to establish this system: firstly, a 3-D GIS database and 3-D terrain with higher resolution aerial photos and DEM (Digital Elevation Model) have been built; secondly, a system architecture was proposed to integrate real-time sensor information data with 3D Web-based GIS; thirdly, the system has been constructed for Gangwon Province as a test bed to verify the applicability.