• Title/Summary/Keyword: Real-time OS

Search Result 245, Processing Time 0.02 seconds

Research on the Implementation of the Virtual Interface on Multi-mode Mobile Nodes (멀티모드 단말을 위한 가상 인터페이스 구현 연구)

  • Lee, Kyoung-Hee;Lee, Seong-Keun;Rhee, Eun-Jun;Cho, Kyoung-Seob;Lee, Hyun-Woo;Ryu, Won;Hong, Seng-Phil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.677-686
    • /
    • 2010
  • In this paper, we propose the virtual interface management scheme on the multi-mode mobile node for supporting multiple connections to various access networks in fixed mobile convergence (FMC) networks. The proposed scheme supports the virtualization of multiple physical network interfaces by presenting only the virtual interface to beyond IP layers and hiding physical network interfaces from them. In the proposed scheme, only one IP address is allocated to virtual interface without any IP allocations to physical network interfaces. Therefore, the proposed scheme does not change its IP address and keep it during the vertical handover, so that it can support the seamless handover of real-time multimedia services among heterogeneous access networks. The proposed scheme is implemented on the multi-mode mobile node with multiple network interfaces by using NDIS (Network Driver Interface Specifications) libraries. Through the mobility test-bed and the test application of virtual interface, we evaluate and analyze the performance of the proposed scheme.

Fuzzy Expert System for Detecting Anti-Forensic Activities (안티 포렌식 행위 탐지를 위한 퍼지 전문가 시스템)

  • Kim, Se-Ryoung;Kim, Huy-Kang
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.47-61
    • /
    • 2011
  • Recently, the importance of digital forensic has been magnified because of the dramatic increase of cyber crimes and the increasing complexity of the investigation of target systems such as PCs, servers, and database systems. Moreover, some systems have to be investigated with live forensic techniques. However, even though live forensic techniques have been improved, they are still vulnerable to anti-forensic activities when the target systems are remotely accessible by criminals or their accomplices. To solve this problem, we first suggest a layer-based model and the anti-forensic scenarios which can actually be applicable to each layer. Our suggested model, the Anti-Forensic Activites layer-based model, has 5 layers - the physical layer, network layer, OS layer, database application layer and data layer. Each layer has possible anti-forensic scenarios with detailed commands. Second, we propose a fuzzy expert system for effectively detecting anti-forensic activities. Some anti-forensic activities are hardly distinguished from normal activities. So, we use fuzzy logic for handling ambiguous data. We make rule sets with extracted commands and their arguments from pre-defined scenarios and the fuzzy expert system learns the rule sets. With this system, we can detect anti-forensic activities in real time when performing live forensic.

TeloSIM: Instruction-level Sensor Network Simulator for Telos Sensor Node (TeloSIM: Telos 형 센서노드를 위한 명령어 수준 센서네트워크 시뮬레이터)

  • Joe, Hyun-Woo;Kim, Hyung-Shin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1021-1030
    • /
    • 2010
  • In the sensor network, many tiny nodes construct Ad-Hoc network using wireless interface. As this type of system consists of thousands of nodes, managing each sensor node in real world after deploying them is very difficult. In order to install the sensor network successfully, it is necessary to verify its software using a simulator beforehand. In fact Sensor network simulators require high fidelity and timing accuracy to be used as a design, implementation, and evaluation tool of wireless sensor networks. Cycle-accurate, instruction-level simulation is the known solution for those purposes. In this paper, we developed an instruction-level sensor network simulator for Telos sensor node as named TeloSlM. It consists of MSP430 and CC2420. Recently, Telos is the most popular mote because MSP430 can consume the minimum energy in recent motes and CC2420 can support Zigbee. So that TeloSlM can provide the easy way for the developers to verify software. It is cycle-accurate in instruction-level simulator that is indispensable for OS and the specific functions and can simulate scalable sensor network at the same time. In addition, TeloSlM provides the GUI Tool to show result easily.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Study on Nursing Service of Chronic Diseases by the First Step and Third Step Medical Treatment (1차 및 3차 진료기관 이용 만성질환자의 간호서비스에 관한 연구)

  • Cho Chong Sook
    • Journal of Korean Public Health Nursing
    • /
    • v.10 no.2
    • /
    • pp.103-118
    • /
    • 1996
  • It is to be growing up the interest of community health affairs through visiting nursing care. The health medical treatment of Korea has been changed largely on the period. The juvenile population has decreased. This means that is has took the population consensus of advanced national organization to be increased by the old age. The transition of disease has changed from the contagious disease importance to the chronicity disease omportance because the domestic district population has experienced the sudden urbanization circumstance district population has experienced the sudden urbanization circumstance to be growing up $70\%$ of the whole population. When the nursing service has common function to be delivering from all direction to home, this study is getting the great important phase velocity in order to manage the kernel questional adult chronicity disease of health medical institution at the present age. (1) community over system or with people particularity (2) the first of third step medical treatments. The variety of medical treatments organization has quantity of the delivery manpower and specially between consumers and rdlated person. A qualitative difference is showed at the purpose to be seizing. That research related person is use at district health center in Seoul, by foundation on nurse registration book of H collage hospital and public health registration book. According the chronicity disease. age. and sex. nature agree-able standard 54 people took the content analysis on nurse registration book of total 108 people. The results of the study were as follows: 1. General background factors are houses or kind of medical facilities and number of patients in family. The first medical treatment is more patients than third medical treatment organization. The first medical treatment of economic environment os appering to be worse. 2. The chronicity disease frequency have been different speciality according to medical treatment organization. On case of the first medical treatment. Diabetes and High Blood Pressure were good but Cerebrum Vascular Accident(CVA) showed many for bed case. In addition. the number of family is comparative large exception of CVA on according for moving condition and health more than the first medical treatment. However. family condition. whole family percentage is decreasing preferably through the potential resource is increasing by the number of and the construction of family. The ability of real resource is considered to be low. 3. The average percentage of nurse service has appered to be differed two groups by the first step medical treatment(33.72 times) and third step medical treatment(45.70 times). However, the difference (the first step medical treatment and third step medical treatment) is to be limited to issue the medicine at the service. The condition of nurse care was the indirect nursing care. Supportiong area was to be related to volunteer service and administration support. 4. The various nursing care average percentage of the chronicity disease was increased by orders of Diabetes. High Blood Pressure. and CVA in examination result and the medical treatment. The indirect nursing care was also same. At third step medical treatment, orders of chronicity disease were same. The case of other area on service conditions were increased by order of Diabetes. High Blood Pressure, and CVA. However. it is never appearing the difference at bottleneck affairs nursing care. 5. When the visiting nursing care demand particularly. the average percentage of nursing care from the first step medical treatment that the time under a person is many more than the time over two people. However, there was no difference in statistic. Third step medical treatment is $49.81\%$ at the time under a person. The average nursing care service is appeared by more many when the visiting nursing care demand is a few by 12.83 at the time over two people. 6. By visiting nursing care percentage to be frequency that nursing care averaghe percentage and inter-relation are large. The related factor of the first medical treatment is 0.96. However, the related factor of third medical treatment has shown the decreased 0.49 for the condition of relation more than that. Therefore. the nursing care average percentage is related to the visiting times of a nurse. This result is be showing the obvious fact that the first step medical treatment is few more than third step medical treatment.

  • PDF