• Title/Summary/Keyword: Logging Service

Search Result 33, Processing Time 0.026 seconds

Deduction of Humanistic Metaphor based on Searching, Participation, Sharing and Analysis of Wearable Device (웨어러블 디바이스의 검색, 참여, 공유, 분석을 통한 인문학적 메타포 도출)

  • Lee, Won-Tae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.125-130
    • /
    • 2014
  • According to the lunching of Google glass, the interest for wearable computer is increasing. This paper is about how to apply humanity or humanist metaphor to the development and application of wearable computer. Humanity is consisted of dream, imagination and desire of human mind. However the software development methodology and application design of engineering part are consisted of the logical language and also they are testable. In this paper the different academics are combined and researched to develop the human-friendly application which are the design of humanities-applying wearable computer and the service scenarios. This paper shows the specific examples of services to search, share and analyze the information with wearable computer also presents what kinds of humanistic metaphor is able to apply in this process.

An Application-embedded method to trace OTT viewing patterns on smartphone (스마트폰에서의 OTT(Over The Top)서비스 시청패턴 추적 어플리케이션 설계 : 티빙(tving)을 중심으로)

  • Choi, Sun-Young;Kim, Min-Soo;Kim, Myoung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.1000-1006
    • /
    • 2014
  • This study focuses on the fact that a OTT service is vigorously used for smart phones, and suggests a design of method to trace the experiences of watching television contents. For this purpose, we developed logging functions and embedded them into existing OTT service application to record flow and pattern of watching context. This paper suggests a log file format which can accurately and precisely record watching actions of users per-second methodology rather than former per-minute methodology. Moreover, this study shows that the application can trace watching attitude according to occurring events by characteristics and playing modes of realtime broadcasting, VOD, advertisement contents. In addition, based on the result of the study, this paper discusses educational, operational meaning of the method such as methodological application in mobile ethnography field or survey for total screening rate.

Borehole Elemental Concentration Logs: Theory, Current Trends and Next Level (암석구성성분검층: 원리, 연구동향 및 향후 과제)

  • Shin, Jehyun;Hwang, Seho
    • Geophysics and Geophysical Exploration
    • /
    • v.22 no.3
    • /
    • pp.149-159
    • /
    • 2019
  • Borehole elemental concentration logging, measuring neutron-induced gamma rays by inelastic scattering and neutron capture interactions between neutron and formation, delivers concentrations of the most common elements found in the minerals and fluids of subsurface formation. X-ray diffraction and X-ray fluorescence analysis from core samples are traditionally used to understand formation composition and mineralogy, but it represents only part of formations. Additionally, it is difficult to obtain elemental analysis over the whole intervals because of poor core recovery zones such as fractures or sand layers mainly responsible for groundwater flow. The development of borehole technique for in situ elemental analysis plays a key role in assessing subsurface environment. Although this technology has advanced consistently starting from conventional and unconventional resources evaluation, it has been considered as exclusive techniques of some major service company. As regards domestic research and development, it has still remained an unexplored field because of some barriers such as the deficiency of detailed information on tools and calibration facility for chemistry and mineralogy database. This article reviews the basic theory of spectroscopy measurements, system configuration, calibration facility, and current status. In addition, this article introduces the domestic researches and self-development status on borehole elemental concentration tools.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Design and Implementation of Web-based Home PNA Device Management System (웹 기반 Home PNA 장치 관리 시스템의 설계 및 구현)

  • An, Byeong-O;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.865-874
    • /
    • 2001
  • In this paper, we have designed and implemented Web based Home Phoneline Neworking Aliance(Home PNA)device management, system which can resolve the unfair bandwidth service form may subscribers and manage subscribes using these devices. To manage Home PNA device with Simple Network Management Protocol(SNMP) management elements are classified into system. Port performance, fault functional area based on Management Information Base(MIB) objects from Multi Dwelling Unit(MDU) devices MIB. System management provides configuration information of each MDU devices, and port management provides the current state of subscribes and performs filtering operation against the unauthorized users. And performance management provides traffic information about trunk and subscriber lines. Finally fault management provides fault logging fo the unexpected events and trap message from devices To verify the operability of the proposed system, we have tested it in real network environment.

  • PDF

Proposed Survey Steps for Investigation of Land-Creeping Susceptibility Areas: A Focus on Geophysical Mapping of the Yongheung-dong, Pohang, Korea

  • Kim, Jeong-In;Lee, Sun-Joong;Kim, Kwan-Soo;Lee, Jae-Eun;Sa, Jin-Hyun;Kim, Ji-Soo
    • The Journal of Engineering Geology
    • /
    • v.31 no.3
    • /
    • pp.269-281
    • /
    • 2021
  • Land creeping is the imperceptibly slow, steady, downward movement o f slope-forming soil or rock. Because creep-related failures occur frequently on a large scale without notice, they can be hazardous to both property and human life. Korea Forest Service has operated the prevention and response system from land creeping which has been on the rise since 2018. We categorized and proposed three survey steps (e.g., preliminary, regional, detailed) for investigation of creeping susceptibility site with a focus on geophysical mapping of a selected test site, Yongheung-dong, Pohang, Korea. The combination of geophysical (dipole-dipole electrical resistivity tomography and reciprocal seismic refraction technique, well-logging), geotechnical studies (standard penetrating test, laboratory tests), field mapping (tension cracks, uplift, fault), and comprehensive interpretation of their results provided the reliable information of the subsurface structures including the failure surface. To further investigate the subsurface structure including the sliding zone, we performed high-resolution geophysical mapping in addition to the regional survey. High-resolution seismic velocity structures are employed for stability analysis because they provided more simplified layers of weathering rock, soft rock, and hard rock. Curved slip plane of the land creeping is effectively delineated with a shape of downslope sliding and upward pushing at the apex of high resistive bedrock in high-resolution electrical resistivity model with clay-mineral contents taken into account. Proposed survey steps and comprehensive interpretation schemes of the results from geological, geophysical, and geotechnical data should be effective for data sets collected in a similar environment to land-creeping susceptibility area.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Security Analysis on the Home Trading System Service and Proposal of the Evaluation Criteria (홈트레이딩 시스템 서비스의 보안 취약점 분석 및 평가기준 제안)

  • Lee, Yun-Young;Choi, Hae-Lahng;Han, Jeong-Hoon;Hong, Su-Min;Lee, Sung-Jin;Shin, Dong-Hwi;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.115-137
    • /
    • 2008
  • As stock market gets bigger, use of HTS(Home Trading System) is getting increased in stock exchange. HTS provides lots of functions such as inquiry about stock quotations, investment counsel and so on. Thus, despite the fact that the functions fur convenience and usefulness are developed and used, security functions for privacy and trade safety are insufficient. In this paper, we analyze the security system of HTS service through the key-logging and sniffing and suggest that many private information is unintentionally exposed. We also find out a vulnerable point of the system, and show the advisable criteria of secure HTS.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

Seed Fructification and Seed Dispersal Characteristics by Harvest Types in Natural Regeneration Sites of Larix kaempferi (일본잎갈나무 천연갱신지의 종자 결실 및 벌채 유형별 종자 비산 특성)

  • Chung, Junmo;Kim, Hyun Seop;Chung, Sanghoon
    • Journal of Korean Society of Forest Science
    • /
    • v.110 no.3
    • /
    • pp.295-307
    • /
    • 2021
  • This study proposed a field-applicable natural regeneration method using natural seeding to afforest a secondary growth forest after felling in Larix kaempferi plantations. In 2016, an experimental site was established usingseed-tree and clear-cutting methods in Gapyeong, Gyeonggi-do, South Korea. Characteristics of seed fructification and inflow in the natural regeneration site were analyzed along with an experimental site in Bonghwa, Gyeongsangbuk-do, which was established in 2014. As a result, the number of seeds per individual tree of V age class L. kaempferi was 690,340 seeds in a good year, with an estimated 13.8 million seeds per ha fruited in natural regeneration sites of L. kaempferi with 25 seed-trees per ha. Seed dispersal began in September and germination rates of seeds dispersed until November were greater than 40%. Reserved seed-tree sites showed the highest amount of seed inflow, followed by the seed-tree site and clear-cut site in descending order. The reserved seed-tree method performed better than other methods for evenly scattering seeds. Therefore, the timing of logging and seedbed generation for natural regeneration of L. kaempferi is estimated to be most effective before September when seeds are purposefully scattered using the reserved seed-tree method as an effective method for uniform seed supply.