• Title/Summary/Keyword: 로깅

Search Result 185, Processing Time 0.024 seconds

Development of Multiple Channel Measurement System for IC Socket (IC 소켓 검사용 다중 채널 측정 시스템 개발)

  • Gang, Sang-Il;Song, Sung-Yong;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.315-321
    • /
    • 2021
  • In this paper, we have developed the multiple channel measurement system for IC Socket Test. The one can test the current-voltage measurements for pitting the several device specification, which analyze the thin current from several ㎂ to 5A with very low resistor mΩ. The increasement of the IC socket channel with lead pitch under 0.25 mm be need to perform several functions, concurrently. The system to perform these functions be designed to integrate several SMU(source measure unit) on board. So, we can reduce the 2 minutes test time per channel point to 40 sec, with daisy chain test method. Using by graphic interface, I-V curve mode and data logging technologies, we can implement the test flow methods and can make economies the time and cost.

IoT Platform System for Electric Fire Prediction and Prevention (전기화재 예측 및 예방을 위한 IoT 플랫폼 시스템)

  • Yang, Seungeui;Lee, Sungock;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.223-229
    • /
    • 2022
  • During the winter season, when the weather gets colder every year, electricity consumption increases rapidly. The occurrence of fires is increasing due to a short circuit in electrical facilities of buildings such as markets, bathrooms, and apartments with high population density while using a lot of electricity. The cause of these short circuit fires is mostly due to the aging of the wires, the usage increases, and the excessive load cannot be endured, and the wire sheath is melted and caused by nearby ignition materials. In this paper, the load and overheat generated in the electric wire are measured through a complex sensor composed of an overload sensor, a VoC sensor, and an overheat sensor. Based on this, big data analysis is carried out to develop a platform capable of predicting, alerting, and blocking electric fires in real time, and a simulator capable of simulated fire experiments.

A Study on the Consumer Perception of Metaverse Before and After COVID-19 through Big Data Analysis (빅데이터 분석을 통한 코로나 이전과 이후 메타버스에 대한 소비자의 인식에 관한 연구)

  • Park, Sung-Woo;Park, Jun-Ho;Ryu, Ki-Hwan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.287-294
    • /
    • 2022
  • The purpose of this study is to find out consumers' perceptions of "metaverse," a newly spotlighted technology, through big data analysis as a non-face-to-face society continues after the outbreak of COVID-19. This study conducted a big data analysis using text mining to analyze consumers' perceptions of metaverse before and after COVID-19. The top 30 keywords were extracted through word purification, and visualization was performed through network analysis and concor analysis between each keyword based on this. As a result of the analysis, it was confirmed that the non-face-to-face society continued and metaverse emerged as a trend. Previously, metaverse was focused on textual data such as SNS as a part of life logging, but after that, it began to pay attention to virtual reality space, creating many platforms and expanding industries. The limitation of this study is that since data was collected through the search frequency of portal sites, anonymity was guaranteed, so demographic characteristics were not reflected when data was collected.

Software Formal Verification Methodology using Aspect DEVS Verification Framework (Aspect DEVS 검증 틀을 이용한 소프트웨어 정형 검증 방법론)

  • Choi, Chang-Beom;Kim, Tag-Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2009
  • Software is getting more complex due to a variety of requirements that include desired functions and properties. Therefore, verifying and testing the software are complicated problems. Moreover, if the software is already implemented, inserting and deleting tracing/logging code into the source code may cause several problems, such as the code tangling and the code scattering problems. This paper proposes the Aspect DEVS Verification Framework which supports the verification and testing process. The Aspect DEVS Verification Framework utilizes Aspect Oriented Programming features to handle the code tangling and the code scattering problems. By applying aspect oriented features, a user can find and fix the inconsistency between requirement and implementation of a software without suffering the problems. The first step of the verification process is the building aspect code to make a software act as a generator. The second step is developing a requirement specification using DEVS diagrams and implementing it using the DEVSIM++. The final step is comparing the event traces from the software with the possible execution sequences from DEVS model.

Attack Detection Technology through Log4J Vulnerability Analysis in Cloud Environments (클라우드 환경에서 Log4J 취약점 분석을 통한 공격 탐지 기술)

  • Byeon, Jungyeon;Lee, Sanghee;Yoo, Chaeyeon;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.557-559
    • /
    • 2022
  • The use of open source has the advantage that the development environment is convenient and maintenance is easier, but there is a limitation in that it is easy to be exposed to vulnerabilities from a security point of view. In this regard, the LOG4J vulnerability, which is an open source logging library widely used in Apache, was recently discovered. Currently, the risk of this vulnerability is at the 'highest' level, and developers are using it in many systems without being aware of such a problem, so there is a risk that hacking accidents due to the LOG4J vulnerability will continue to occur in the future. In this paper, we analyze the LOG4J vulnerability in detail and propose a SNORT detection policy technology that can detect vulnerabilities more quickly and accurately in the security control system. Through this, it is expected that in the future, security-related beginners, security officers, and companies will be able to efficiently monitor and respond quickly and proactively in preparation for the LOG4J vulnerability.

  • PDF

Development of IoT Sensor-Gateway-Server Platform for Electric Fire Prediction and Prevention (전기화재 예측 및 예방을 위한 IoT 센서-게이트웨이-서버 플랫폼 개발)

  • Yang, Seung-Eui;Kim, Hankil;Song, Hyun-ok;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.255-257
    • /
    • 2021
  • During the winter season, when electricity usage increases rapidly every year, fires are frequent due to short circuits in aging electrical facilities in multi-use facilities such as traditional markets and jjimjilbangs, apartments, and multi-family houses. Most of the causes of such fires are caused by excessive loads applied to aging wires, causing the wire covering to melt and being transferred to surrounding ignition materials. In this study, we implement a system that measures the overload and overheating of the wire through a composite sensor, detects the toxic gas generated there, and logs it to the server through the gateway. Based on this, we will develop a platform that can predict, alarm and block electric fires in real time through big data analysis, and a simulator that can simulate fire occurrence experiments.

  • PDF

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

Control-Path Driven Process-Group Discovery Framework and its Experimental Validation for Process Mining and Reengineering (프로세스 마이닝과 리엔지니어링을 위한 제어경로 기반 프로세스 그룹 발견 프레임워크와 실험적 검증)

  • Thanh Hai Nguyen;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.51-66
    • /
    • 2023
  • In this paper, we propose a new type of process discovery framework, which is named as control-path-driven process group discovery framework, to be used for process mining and process reengineering in supporting life-cycle management of business process models. In addition, we develop a process mining system based on the proposed framework and perform experimental verification through it. The process execution event logs applied to the experimental effectiveness and verification are specially defined as Process BIG-Logs, and we use it as the input datasets for the proposed discovery framework. As an eventual goal of this paper, we design and implement a control path-driven process group discovery algorithm and framework that is improved from the ρ-algorithm, and we try to verify the functional correctness of the proposed algorithm and framework by using the implemented system with a BIG-Log dataset. Note that all the process mining algorithm, framework, and system developed in this paper are based on the structural information control net process modeling methodology.

A Study on Changes in the Healthcare and Medical Administration Major Education Platform Using the Virtual Reality World Metaverse (가상현실세계 메타버스를 활용한 보건의료행정 전공교육 플랫폼 변화에 대한 고찰)

  • Ok-Yul Yang;Yeon-Hee Lee
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.2
    • /
    • pp.275-284
    • /
    • 2021
  • This study is a review on the educational methodologies of junior colleges for nurturing health and medical administration experts. As non-face-to-face classes increase due to the pandemic and various online classes are being conducted, the rejection of virtual education is decreasing. The concept of 'metaverse', first used in 1992, is changing from metaverse 1.0 to metaverse 2.0 as of 2021. Metaverse is judged to be able to positively derive the educational effect of online education through four methodologies: VR(Virtual Reality), AR(Augmented Reality), Life Logging, and Mirror World. This study aims to design an education platform that realizes professional education that transcends time and space by establishing the same university in the form of a mirror world or virtual reality in the virtual reality metaverse, and opening a department of health and medical administration. In addition, It is researchwhen metaverse virtual universities and virtual departments are created for each university, students can cross-take courses offered by each university and purchase or share open courses to take new educational topics for common subjects.

A Study on Industrial Potential of Artificial Intelligence through the Cases of Film and Artificial Intelligence Art (예술에서 살펴본 인공지능의 미래 산업화 가능성 - 영화와 인공지능 예술을 중심으로)

  • Kim, Hee-Young
    • Cartoon and Animation Studies
    • /
    • s.50
    • /
    • pp.423-452
    • /
    • 2018
  • The possibility of future industrialization of artificial intelligence was studied through aspects of artificial intelligence art and movie. The field of artificial intelligence is developing by imitating humans through past and present, so it can be inferred that it is important to grasp the future image presented in movie and artificial intelligence art. Human values are represented differently in artificial intelligence films and arts. Artificial intelligence film and art are concerned with the external and internal aspects of human values, respectively. The AI movie looks at similar external aspects in human and AI shape and function, but artificial intelligence art deals with human alienation and lack of communication due to artificial intelligence technology development. Artificial intelligence in movies is a direction to visualize the imagination for artificial intelligence technology, and artificial intelligence art is expressed in the way of making and implementing works using technology. The future of artificial intelligence, which we have shown in imagination in movies today, is being realized technologically. Artificial intelligence art reflects the problems of artificial intelligence technology that can be appeared through current technology, and human problems that may arise from artificial intelligence technology development. Movies and artificial intelligence art reflect the current problems, and through them we can see the future of artificial intelligence. The future of artificial intelligence in movies is an artificial intelligence service that provides human convenience, cyborg artificial intelligence industry, industry that uses exoskeleton robot and exoskeleton suit, and artificial intelligence secretary. If we look at the future of artificial intelligence through the artificial intelligence art in terms of the problems of artificial intelligence technology and the problem of human value, there are artificial intelligence to learn from trial and error or mistakes, self-expression and communication by lifelogging, recovery of miscommunications by a reflective thinking, and an expansion of the area of artificial intelligence artist through human uncertainty. The future industrialization potential of artificial intelligence as study through aspects of artificial intelligence art and movie is an industry that extends the five senses, an industry that improves the insufficient physical ability of the human, an industry that enhances the physical ability of the human being, and an industry that maintains psychological and mental well-being.