• Title/Summary/Keyword: Device Network

Search Result 2,401, Processing Time 0.027 seconds

Digital Watermarking for Robustness of Low Bit Rate Video Contents on the Mobile (모바일 상에서 비트율이 낮은 비디오 콘텐츠의 강인성을 위한 디지털 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Video contents in the mobile environment are processed with the low bit-rate relative to normal video contents due to the consideration of network traffic; hence, it is necessary to protect the copyright of the low bit-rate video contents. The algorithm for watermarking appropriate for the mobile environment should be developed because the performance of the mobile devices is much lower than that of personal computers. This paper suggested the invisible spread spectrum watermarking method to the low bit-rate video contents, considering the low performance of the mobile device in the M-Commerce environment; it also enables to track down illegal users of the video contents to protect the copyright. The robustness of the contents with watermark is expressed with the correlation of extraction algorithm from watermark removed or distorted contents. The results of our experiment showed that we could extract the innate frequencies of M-Sequence when we extracted M-Sequence after compressing the contents with watermark easily. Therefore, illegal users of the contents can be tracked down because watermark can be extracted from the low bit-rate video contents.

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일 환경을 위한 맞춤형 서비스 유비쿼터스 영상전송 시스템의 설계)

  • Lee, Sang-Wook;Ahn, Yong-Beom;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.791-799
    • /
    • 2008
  • An image recognition for surrounding conditions is very important in image transmission. In recently rears, as the information infrastructure is more general, the user-centered demands in which they want to identify by object's states image using wire or wireless environment have increased. However, existing mobile solution could be hard to expect high quality mage, because limitation of software processing according as network based on mobile terminal which has low band width supports software codec. To solve this weak point, this paper describes on hardware codec design based on MPEG-4 which is international video compression standard. Implemented system contains the embedded CPU for optimized design and it works high quality service as transmission speed and resolution in mobile circumstance.

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Bae, Suk-Myong;Kim, Eung-Sik;Kim, Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.499-502
    • /
    • 2009
  • Supply of electric power and electricity safety for whole system and network are essential element. Electricity safety technology need rating for product and research about certification as product development that is done cotton flannel mixed with development of u-IT technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication and module for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in PD, Arc detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

  • PDF

VPN-Filter Malware Techniques and Countermeasures in IoT Environment (사물인터넷 환경에서의 VPN-Filter malware 기술과 대응방법)

  • Kim, Seung-Ho;Lee, Keun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.231-236
    • /
    • 2018
  • Recently, a wide variety of IoT environment is being created due to the rapid development of information and communication technology. And accordingly in a variety of network structures, a countless number of attack techniques and new types of vulnerabilities are producing a social disturbance. In May of 2018, Talos Intelligence, the Cisco threat intelligence team has newly discovered 'VPN-Filter', which constitutes a large-scale IoT-based botnet, is infecting consumer routers in over 54 countries around the world. In this paper, types of IoT-based botnets and the attack techniques utilizing botnet will be examined and the countermeasure technique through EXIF metadata removal method which is the cause of connection method of C & C Server will be proposed by examining the characteristics of attack vulnerabilities and attack scenarios of VPN-Filter.

LTE Load Balancer for Emergency Based on Raspberry Pi and OpenWRT (라즈베리 파이를 활용한 OpenWRT 기반 LTE 비상망 로드밸런서)

  • Baek, Seung-Hyun;Jang, Min-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.97-110
    • /
    • 2019
  • Recently, the 4th Industrial Revolution has been emerged and various products are developed and commercialized in preparation of the communication failure. Many solutions are underway in Back-Up Network for IDC Servers, but not in the personal or sensor for low-power system use. Therefore we used the OpenWRT Firmware in Raspberry Pi which can be easily obtained in online market, and it created a low-power load balancer. Therefore, we developed the device that uses LTE Antenna based on USB Interface for communication fault notification and important data. The equipment used in this paper is easy to buy in online shop for anyone. Also, it can be applied in other vendors' boards by using USB. We hope that this paper will contribute to the stability of individual sensor networks.

Development of a Data Acquisition System for the Long-term Monitoring of Plum (Japanese apricot) Farm Environment and Soil

  • Akhter, Tangina;Ali, Mohammod;Cha, Jaeyoon;Park, Seong-Jin;Jang, Gyeang;Yang, Kyu-Won;Kim, Hyuck-Joo
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.426-439
    • /
    • 2018
  • Purpose: To continuously monitor soil and climatic properties, a data acquisition system (DAQ) was developed and tested in plum farms (Gyewol-ri and Haechang-ri, Suncheon, Korea). Methods: The DAQ consisted of a Raspberry-Pi processor, a modem, and an ADC board with multiple sensors (soil moisture content (SEN0193), soil temperature (DS18B20), climatic temperature and humidity (DHT22), and rainfall gauge (TR-525M)). In the laboratory, various tests were conducted to calibrate SEN0193 at different soil moistures, soil temperatures, depths, and bulk densities. For performance comparison of the SEN0193 sensor, two commercial moisture sensors (SMS-BTA and WT-1000B) were tested in the field. The collected field data in Raspberry-Pi were transmitted and stored on a web server database through a commercial communications wireless network. Results: In laboratory tests, it was found that the SEN0193 sensor voltage reading increased significantly with an increase in soil bulk density. A linear calibration equation was developed between voltage and soil moisture content depending on the farm soil bulk density. In field tests, the SEN0193 sensor showed linearity (R = 0.76 and 0.73) between output voltage and moisture content; however, the other two sensors showed no linearity, indicating that site-specific calibration is important for accurate sensing. In the long-term monitoring results, it was observed that the measured climate temperature was almost the same as website information. Soil temperature information was higher than the values measured by DS18B20 during spring and summer. However, the local rainfall measured using TR 525M was significantly different from the values on the website. Conclusion: Based on the test results obtained using the developed monitoring system, it is thought that the measurement of various parameters using one device would be helpful in monitoring plum growth. Field data from the local farm monitoring system can be coupled with website information from the weather station and used more efficiently.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Factors affecting success and failure of Internet company business model using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 인터넷 기업 비즈니스 모델의 성공과 실패에 영향을 미치는 요인에 관한 연구)

  • Jin, Dong-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.111-116
    • /
    • 2019
  • New technologies such as the IoT, Big Data, and Artificial Intelligence, starting from the Web, mobile, and smart device, enable new business models that did not exist before, and various types of Internet companies based on these business models has been emerged. In this research, we examine the factors that influence the success and failure of Internet companies. To do this, we review the recent studies on business model and examine the variables affecting the success of Internet companies in terms of network effect, user interface, cooperation with actors, creating value for users. Using the five derived variables, we will select 14 Internet companies that succeeded and failed in seven commercial business model categories. We derive decision tree by applying inductive learning based on ID3 algorithm to the analysis result and derive rules that affect success and failure based on derived decision tree. With these rules, we want to present the strategic implications for actors to succeed in Internet companies.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.