• Title/Summary/Keyword: Electronic resources

Search Result 970, Processing Time 0.022 seconds

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things (사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.707-714
    • /
    • 2023
  • The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

Evaluation of Output Performance of Flexible Thermoelectric Energy Harvester Made of Organic-Inorganic Thermoelectric Films Based on PEDOT:PSS and PVDF Matrix (PEDOT:PSS 및 PVDF 기반의 유-무기 열전 필름으로 제작된 플렉서블 열전 에너지 하베스터의 발전 성능 평가)

  • Yujin Na;Kwi-Il Park
    • Korean Journal of Materials Research
    • /
    • v.33 no.7
    • /
    • pp.295-301
    • /
    • 2023
  • Thermoelectric (TE) energy harvesting, which converts available thermal resources into electrical energy, is attracting significant attention, as it facilitates wireless and self-powered electronics. Recently, as demand for portable/wearable electronic devices and sensors increases, organic-inorganic TE films with polymeric matrix are being studied to realize flexible thermoelectric energy harvesters (f-TEHs). Here, we developed flexible organic-inorganic TE films with p-type Bi0.5Sb1.5Te3 powder and polymeric matrices such as poly(3,4-eethylenedioxythiophene):poly(styrene sulfonate) (PEDOT:PSS) and poly (vinylidene fluoride) (PVDF). The fabricated TE films with a PEDOT:PSS matrix and 1 wt% of multi-walled carbon nanotube (MWCNT) exhibited a power factor value of 3.96 µW·m-1·K-2 which is about 2.8 times higher than that of PVDF-based TE film. We also fabricated f-TEHs using both types of TE films and investigated the TE output performance. The f-TEH made of PEDOT:PSS-based TE films harvested the maximum load voltage of 3.4 mV, with a load current of 17.4 µA, and output power of 15.7 nW at a temperature difference of 25 K, whereas the f-TEH with PVDF-based TE films generated values of 0.6 mV, 3.3 µA, and 0.54 nW. This study will broaden the fields of the research on methods to improve TE efficiency and the development of flexible organic-inorganic TE films and f-TEH.

ITU-T International Standard based Trust-enabled Service Provisioning Technology (ITU-T 국제표준 중심의 신뢰 서비스 프로비저닝 기술)

  • Hoan-Suk Choi;Jun-Kyun Choi;Woo-Seop Rhee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.420-433
    • /
    • 2023
  • With the development of ICT technologies, various systems and services based on data have been introduced. Also, raising the importance of technologies that provide trust to a data, infrastructure, and services. for ICT services. However, in the existing ICT service environment, there is no way to objectively judge and manage the trust of various components (content, infrastructure, process, service provider, etc) that constitute a specific service, and there is a limitation that we can only rely on the service provider's own quality standards. This paper provides requirements, functional archtecture, and procedures for providing reliable ICT services from the perspective of ITU-T international standards. Trust-enabled service provisioning adds additional functions for providing trust to existing ICT service entities (service resources, stakeholders, and users), collecting, analyzing, and providing trust related information. Therefore, a users can consider the trust of various service components based on analyzed trust information based on their trust requirements.

Active-Passive Ranging Method for Effective Positioning in Massive IoT Environment (대규모 IoT 환경에서의 효과적 측위를 위한 능동적-수동적 거리 추정 기법)

  • Byungsun Hwang;Seongwoo Lee;Kyoung-Hun Kim;Young-Ghyu Sun;Jin-Young Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.41-47
    • /
    • 2024
  • With the advancement and proliferation of the Internet of Things (IoT), a wide range of location-based services are being offered, and various ranging methods are being researched to meet the objectives of the required services. Conventional ranging methods involve the direct exchange of signals between tags and anchors to estimate distance, presenting a limitation in efficiently utilizing communication resources in large-scale IoT environments. To overcome these limitations, active-passive ranging methods have been proposed. However, there is a lack of theoretical convergence guarantees against clock drift errors and a detailed analysis of the characteristics of ranging estimation techniques, making it challenging to derive precise positioning results. In this paper, an improved active-passive ranging method that accounts for clock drift errors is proposed for precise positioning in large-scale IoT environments. The simulation results confirmed that the proposed active-passive ranging method can enhance distance estimation performance by up to 94.4% and 14.4%, respectively, compared to the existing active-passive ranging methods.

Factors Associated With Long-term Retention in Antiretroviral Therapy Among People Living With HIV: Evidence From a Tertiary Hospital in Jakarta, Indonesia

  • Ifael Yerosias Mauleti;Krishna Adi Wibisana;Djati Prasetio Syamsuridzal;Sri Mulyati;Vivi Lisdawati;Ika Saptarini;Nurhayati;Armedy Ronny Hasugian;Harimat Hendarwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.57 no.3
    • /
    • pp.252-259
    • /
    • 2024
  • Objectives: This study investigated factors associated with the retention of people living with human immunodeficiency virus (HIV) on antiretroviral therapy (ART) during the first 3 years of treatment. Methods: A retrospective study using electronic health records was conducted at a tertiary hospital in Jakarta, Indonesia. Adult HIV-positive patients who started ART from 2010 until 2020 were included. A binary logistic regression model was used to identify factors associated with ART retention in the first 3 years. Results: In total, 535 respondents were included in the analysis. The ART retention rates for the first, second, and third years were 83.7%, 79.1%, and 77.2%, respectively. The multivariate analysis revealed a negative association between CD4 count when starting ART and retention. Patients with CD4 counts >200 cells/mL were 0.65 times less likely to have good retention than those with CD4 counts ≤200 cells/mL. The year of starting ART was also significantly associated with retention. Patients who started ART in 2010-2013 or 2014-2016 were less likely to have good retention than those who started ART in 2017-2020, with adjusted odds ratios of 0.52 and 0.40, respectively. Patients who received efavirenz-based therapy were 1.69 times more likely to have good retention than those who received nevirapine (95% confidence interval, 1.05 to 2.72). Conclusions: Our study revealed a decline in ART retention in the third year. The CD4 count, year of enrollment, and an efavirenz-based regimen were significantly associated with retention. Patient engagement has long been a priority in HIV programs, with interventions being implemented to address this issue.

Multimedia Technologies for Teaching Musical Art under Present-day Conditions

  • Svitlana Huralna;Nataliia Demianko;Nataliia Sulaieva;Viktoriia Irkliienko;Tetiana Horokhivska
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.165-171
    • /
    • 2024
  • The processes of society's informatization and digitalization necessitate the widespread use of new pedagogical technologies. Through these technologies, comprehensive disclosure of didactic functions of new methods of educational activity and the realization of the potential and creative potential. The use of information and computer multimedia technologies in teaching music art is especially relevant in the intensification of the development of interactive technologies, the transition to mixed forms of learning, and a period of socio-economic and sociopolitical upheavals. The study aims to substantiate the theoretical and applied principles of the analysis of multimedia technology learning musical art in modern conditions and assess the status and trends in their use in conducting educational activities. The study uses general scientific and unique methods of economic analysis, in particular, analysis and synthesis, analogy and comparison, generalization and systematization, and graphic ways. Regarding the results of the study of multimedia technologies for teaching musical art in current conditions, it was found that they contribute to the development of the seeker's creative, creative, and cognitive activity, have a positive impact on learning material, and diversify the educational process. Multimedia technologies such as presentations, programs for watching a video, listening to audio, music and singing karaoke, electronic encyclopedias, and Internet resources are proven to be the most used in music education. They have several qualitative and quantitative advantages, manifested in the possibilities of audio-visual presentation of educational material and significantly higher information density. It is suggested to strengthen the use of such computer programs as Microsoft Word, Ahead Nero, Finale, Adobe Audition, Sound Forge, and Microsoft PowerPoint for musical art classes.

Implementation of a Window-Masking Method and the Soft-core Processor based TDD Switching Control SoC FPGA System (윈도 마스킹 기법과 Soft-core Processor 기반 TDD 스위칭 제어 SoC 시스템 FPGA 구현)

  • Hee-Jin Yang;Jeung-Sub Lee;Han-Sle Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.3
    • /
    • pp.166-175
    • /
    • 2024
  • In this paper, the Window-Masking Method and HAT (Hardware Attached Top) CPU SoM (System on Module) are used to improve the performance and reduce the weight of the MANET (Mobile Ad-hoc Network) network synchronization system using time division redundancy. We propose converting it into a RISC-V based soft-core MCU and mounting it on an FPGA, a hardware accelerator. It was also verified through experiment. In terms of performance, by applying the proposed technique, the synchronization acquisition range is from -50dBm to +10dBm to -60dBm to +10dBm, the lowest input level for synchronization is increased by 20% from -50dBm to -60dBm, and the detection delay (Latency) is 220ns. Reduced by 43% to 125ns. In terms of weight reduction, computing resources (48%), size (33%), and weight (27%) were reduced by an average of 36% by replacing with soft-core MCU.

Time Reduction for Package Warpage Optimization based on Deep Neural Network and Bayesian Optimization (심층신경망 및 베이지안 최적화 기반 패키지 휨 최적화 시간 단축)

  • Jungeon Lee;Daeil Kwon
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.31 no.3
    • /
    • pp.50-57
    • /
    • 2024
  • Recently, applying a machine learning to surrogate modeling for rapid optimization of complex designs have been widely researched. Once trained, the machine learning surrogate model can predict similar outputs to Finite Element Analysis (FEA) simulations but require significantly less computing resources. In addition, combined with optimization methodologies, it can identify optimal design variable with less time requirement compared to iterative simulation. This study proposes a Deep Neural Network (DNN) model with Bayesian Optimization (BO) approach for efficiently searching the optimal design variables to minimize the warpage of electronic package. The DNN model was trained by using design variable-warpage dataset from FEA simulation, and the Bayesian optimization was applied to find the optimal design variables which minimizing the warpage. The suggested DNN + BO model shows over 99% consistency compared to actual simulation results, while only require 15 second to identify optimal design variable, which reducing the optimization time by more than 57% compared to FEA simulation.