• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.023 seconds

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

Building an Overseas Infrastructure Offices of the Information Security Industry (정보보호 산업 해외 거점 인프라 생성 연구)

  • Cho, Chang-Duk;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.103-109
    • /
    • 2016
  • The information security industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. For the export of high value-added enterprise information security products and services, it is necessary the establishment of the domestic IT information security infrastructure of the industrial promotion is based overseas. Come to analyze the domestic information security industry, capital of this small, market reclamation of overseas expansion, information, manpower shortage was a problem. This fact, combined losses caused by cost-free period AS. Therefore, the study on information security in the infrastructure industry overseas bases is necessary. How to select and analyze the causes of infrastructure in selected overseas offices. By utilizing the infrastructure of overseas bases, can raise the added value of the products and services of the Information Security company, we can enable the export of small and medium Information Security company from overseas offices.

Protection of Private information in Electronic Commerce (전자상거래에 있어 개인정보 보호에 관한 국.내외의 비교연구)

  • Cheung, Chong-Soo
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.77-96
    • /
    • 2002
  • Through the new round DDA(Doha Development Agenda) negotiations which started in Doha/Qatar conference in November, 2001, service industries have been included in the category of international trades. An electronic commerce cannot be exceptional in this field. The 21st century is largely recognized as the era of globalization, knowledge, and information. To make effective and competitive strategy in this century, it is essentially required to organize Network. OPEN, and FU-PLEX. That is why our government also has been promoting this field since years before, now 10,000,000 people in Korea have joined superhighway internet networks. Korea became the top internet-developed country in the world. As a side-effect of this internet spread into our life, however, there is serious problem we are now faced against. That is the outflow of private information through electronic commerce and other cyber transactions. It has caused many social problems to be rapidly on the rise these days. We are now desperately required to struggle continuously to make a solution for that. Taking the precedent case of Germany and United States which are currently recognized as high-leveled country in protection of private information, we have to come up with legal and technical measures and at the same time, to escalate the social consciousness about private information protection.

  • PDF

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

Analyzing Home Network System Adaptation Status in Apartments (아파트 홈네트워크 시스템 적용실태 조사연구)

  • Lee Sun-A;Chang Kyung-Moon;Kim Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.571-574
    • /
    • 2004
  • It is rapidly expanding to provide Home Digital Service based on the Home Network System in intelligent apartment. Fortunately, Korea has one of the highest rates of Internet penetration and access in the world. Construction companies used the Home Network system as a strategy of differentiation and it is available to the customers to raise their asset value. Besides, the government has a positive response to accept the new movements to make the digital environment with 'u-Korea (Ubiquitous Korea)' as the slogan. However, the level of providing Home Digital Service is actually at the beginning. The develop the home network industry more effectively, the related industries' cooperation is essential. The purpose of this study is to propose a providing model of Home Network System for the construction company and to make a method to response the fast change of technology development and customer's request at the point of construction companies' view.

  • PDF

Design and Implementation of Fishes Growth Process System using Morphing Techniques (모핑 기법을 활용한 어류 성장 과정 시스템 설계 및 구현)

  • Kim, Eung-Kon;Ryu, Nam-Hoon;Lee, Hye-Mi;Oh, Kyeong-Sug;Ban, Kyeong-Jin;Han, Jae-Jeong;Park, Yeong-Og
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.1
    • /
    • pp.102-108
    • /
    • 2010
  • With gradual growth of digital image contents industry connected with computer graphics technology, users require high-quality animations similar to real world and want to observe the type of fishes or their swimming types through cyber aquarium and fish encyclopedia. This study designed and developed fish growth process system to express natural and dynamic movement of fish, which is the critical in expressing submarine environment. This system proposes new mopping technique not presented in existing mopping studies as well as simulation using algorithm that newly supplemented existing fish swimming types. In addition, disease infection status is realistically expressed, which may occur depending on environmental factors during their growth process. With comprehensive fish studies, different from existing fish studies, this study examines the overall features of fish with realistic simulation.

There's No Such Thing as Free Lunch but Envy among Young Facebookers

  • Iqbal, Tassawar;Yousafzai, Muhammad Tariq;Ali, Sabeen;Sattar, Kinza;Saleem, Muhammad Qaiser;Habib, Usman;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4724-4737
    • /
    • 2018
  • Facebook has quickly infused across cultures worldwide to become a common household term for diverse spectra of netizens, especially youngsters. Inherently, interactive in nature, Facebook provides a common cyber enabled platform for online interactions with social friends, living across the world. However, despite its merits, users also experience certain disadvantages, which include but are not limited to rise in feelings of social comparison, decline in self-esteem, contentment and general subjective well-being. This work aims to determine the role of Facebook in spreading envy and identify factors that trigger such emotions. Due to abductive nature of the study, we used pilot interviews and consulted relevant literature to formulate hypotheses. Further, we used deductive approach and conducted a survey. The results showed that frequent use of Facebook, particularly passive following is main predictor of envy, and social interaction is the biggest cause for development of envious feelings in Facebook users. However, insignificant variation was found while investigating relationship between envy and factors, such as pretentiousness, time spent, accomplishment, everything in life, likes on posts, popularity across genders, marital status and genre.

A Case study on the Utilization of Emulation Based Network Testbeds (에뮬레이션 기반 테스트베드 활용 사례 연구)

  • Lee, Minsun;Yoo, Kwan-Jong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.61-67
    • /
    • 2018
  • Emulab software was developed by the team of University of Utah and it has been replicated at dozens of other sites in the world. Although KREONET Emulab, which established by the Korea Institute of Science and Technology Information, has only a modest number of compute nodes it has been provided an ideal playground to conduct various research for network protocols, cyber security and convergence research. A testbed is a critical enabler of experimental research and researchers only carry out the experiments that are supported by the testbed. This paper outlines the Utah Emulab's status and use types among the last 10 years of operation results and compares them with the ones with the KREONET Emulab. In addition, Testbed-as-a-Service(TaaS) is discussed to upgrade the testbed for the convergence research community services.

One Dimensional Seismic Response Analysis on Sub-ground of Architectural Heritage in Seoul, Korea (서울지역 주요 문화재 하부 지반에 대한 일차원 지진응답해석)

  • Jeon, Seongkon;Kim, Dukmoon;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.9
    • /
    • pp.29-36
    • /
    • 2014
  • Under the situation that the seismic vulnerability are a worsening problem in many world's megacities, the disaster preparedness including earthquake hazards is a matter of primary concern in the capital city of Korea, Seoul. Especially, because it is hard to move or dismantle the architectural heritages, the mitigation of earthquake damages is potentially more difficult than other structures. Moreover, in order to decide the proper preparedness plan against future earthquakes, it is very important to understand how soils pass the seismic waves to architectural heritages. In this paper, therefore, the ground condition and depth of bedrock was investigated by the MASW-method at heritages located in Seoul. Then one-dimensional seismic response analysis was conducted based on the distribution of shear wave velocity. As the major result of analyses, peak acceleration, site amplification factor and natural period are proposed in each site for recurrence period.