• Title/Summary/Keyword: Portable Security System

Search Result 54, Processing Time 0.021 seconds

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

A Study on portable voice recording prevention device (휴대용 음성 녹음 방지 장치 연구)

  • Kim, Hee-Chul
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.209-215
    • /
    • 2021
  • This study is a system development for voice information protection equipment in major meetings and places requiring security. Security performance and stability were secured with information leakage prevention technology through generation of false noise and ultrasonic waves. The cutoff frequency band for blocking the leakage of voice information, which has strong straightness due to the nature of the radio wave to the recording prevention module, blocks the wideband frequency of 20~20,000Hz, and the deception jamming technology is applied to block the leakage of voice information, greatly improving the security. To solve this problem, we developed a system that blocks the recording of a portable smartphone using a battery, and made the installation of a separate device smaller and lighter so that customers do not recognize it. In addition, it is necessary to continuously study measures and countermeasures for efficiently using the output of the anti-recording speaker for long-distance recording prevention.

Realization of single supply to reduce power on portable radiation detection device (소모전력 감소를 위한 단일 전원 휴대용 방사선 검출장치 구현)

  • Oh, Jae-Kyun;Nam, Hye-Jin;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.1024-1030
    • /
    • 2015
  • Safety and security system have been internationally enhanced in a field of shipping logistics. Accordingly, techniques for safety and security have been studied steadily. The need of portable radiation detection device is increasing by the search of the container is enhanced. In this paper, we propose a study to improve the life of the system and the realization of portable radiation detection device based on Cortex-A9. Configuration of a portable radiation detection device is configured largely to an analog board and the digital platform and the sensor module. The power used in each stage of the analog board is varied. Uses a switching regulator to use various power supply thereby to generate an error result and cause the switching noise. It is proposed to reduce the power consumption reducing technique for the study.

Performance evaluation of sleep stage classifier for the sleep-inducing portable neurofeedback system (포터블 수면유도 뉴로피드백 시스템 구현을 위한 수면뇌파 상태 분류기 성능 평가)

  • Lee, Taek
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.83-90
    • /
    • 2018
  • Recently, many people have suffered from insomnia, labor loss, cognitive decline, and mental illness. The solution to this problem is almost entirely cognitive therapy or medication, but it is not recommended in the long term due to side effects and dependency problems. Therefore, in this paper, we propose a neuro feedback system based on portable EEG that helps induce sleeping. We design and evaluate the EEG classifier, which is the most important function to implement the system, and propose an optimized classifier modeling method for various factors that can affect performance. When using the proposed classifier, we could distinguish 97.9% of awakening and sleep phase in portable EEG.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Implementation of A9-Based Digital Portable Radiation Detector with the Algorithm of Temperature Compensation in Scintillator (Scintillator에 온도 보정 알고리즘을 적용한 A9기반의 디지털 휴대용 방사선 검출기 구현)

  • Lim, Ik-Chan;Park, Geo;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1981-1989
    • /
    • 2017
  • In accordance with the global strengthening of security systems for the safety of the shipping and logistics industry, the development of core technologies within the field has become a key in the establishment of Korea's own national logistics security system. Further in line with these global developments, there is growing attention within Korea to the development of portable radiation detectors capable of detecting gamma ray nuclides. In addition, many parts are becoming localized. In this research, instead of Pulse Shaping Board, which is used in existing portable radiation detectors, we have implemented an Algorithm to discriminate nuclides and correct the temperature conversion efficiency of the scintillator. This paper aims to improve the performance of these devices through the implementation of a temperature conversional algorithm within the scintillator of the A9-based digital portable radiation detector.

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

Design of Image Retrieval System Based on XML Database Using Embedded System (임베디드 시스템을 이용한 XML 데이터베이스를 기반으로 이미지 검색 시스템의 설계)

  • Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.85-89
    • /
    • 2009
  • This study to solve these problems a search system has been designed by combining the two methods. Also the search and manage image data by handheld devices such as portable PDA or smart phone, a system has been designed application to an embedded system. Once this is used, multimedia data can be efficiently searched and utilized by handheld devices.

  • PDF

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Indoor Gas Monitoring System Using Smart Phone Application (스마트폰 어플리케이션을 이용한 실내 가스 모니터링 시스템)

  • Choi, Sung-Yeol;Choi, Jang-Sik;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.49-54
    • /
    • 2012
  • Special applications designed for smart phone, so called "Apps" are rapidly emerging as unique and effective sources of environmental monitoring tools. Using the advantages of Information and Communication Technology (ICT), this paper propose an application that provides Indoor Gas Monitoring System. In this paper, use four wireless gas sensor modules to acquire sensors data wirelessly coupled with the advantages of existing portable smart device based on Android platform to display the real-time data from the sensor modules. Additionally, this paper adapts a simple gas classification algorithm to inform in-door Gas for users real-time based.