• Title/Summary/Keyword: Smart society

Search Result 9,724, Processing Time 0.041 seconds

A Study on the Design of Functional Clothing for Vital sign Monitoring -Based on ECG Sensing Clothing- (생체신호 측정을 위한 기능성 의류의 디자인 연구 -심전도 센싱 의류를 중심으로-)

  • Cho, Ha-Kyung;Song, Ha-Young;Cho, Hyeon-Seong;Goo, Su-Min;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.13 no.3
    • /
    • pp.467-474
    • /
    • 2010
  • Recently, Study of functional clothing for Vital sensing is focused on reducing artifact by human motions, in order to enhance the electrocardiogram(ECG) sensing accuracy. In this study, considering the factors for each element found from the analysis, a 3-lead electrode inside textile embroidered with silver yarn was developed, and draft designs off our types of vital-signal sensing garments, which are 'chest-belt typed' garment, 'cross-typed' garment 'x-typed' garment and 'curved x-typed' garment, were prepared. The draft designs were implemented on a sleeveless male shirt made of an elastic material so that the garment and the electrodes can remain closely attached along the contour of the human body, and the acquired data was sent to the main computer over a wireless network. In order to evaluate the effects caused by body movements and the ECG-sensing capability for each type in static and dynamic states, displacements were measured from one and two dimensional perspectives. ECG measurement evaluation was also performed for Signal-to-noise ratio(SNR) analysis. Applying the experimental results, the draft garment designs were modified and complemented to produce two types of modular approaches 'continuous-attached' and 'insertion-detached' for the ECG-sensing smart clothing.

  • PDF

Identification and Pathogenicity of Colletotrichum Species Causing Anthracnose of Korean Radish (Rhaphanus sativus) in Korea (무 탄저병을 일으키는 Colletotrichum속의 종 동정 및 병원성)

  • Choi, Hyo-Won;Kim, Jeomsoon;Hong, Sung Kee;Lee, Young Kee
    • The Korean Journal of Mycology
    • /
    • v.47 no.4
    • /
    • pp.393-406
    • /
    • 2019
  • In August 2017, anthracnose symptoms were observed on the petioles and leaf veins of Korean radish (Rhaphanus sativus) in Hongcheon, Jeongseon, and Pyeongchang of the Gangwon province, Korea. Many grayish to dark-brown spots of 1-2 mm in diameter, appeared on the lower surface and leaf veins of the radish leaves. The spots gradually enlarged and coalesced to form dark-brown irregular lesions. Ten Colletotrichum isolates were obtained from the affected tissues of the Korean radish. Out of them, eight isolates were identified as C. higginsianum and two isolates were identified as C. truncatum based on morphological characteristics and multi-locus molecular phylogenetic analysis using the internal transcribed spacers and intervening 5.8S rDNA (ITS), partial beta-tubulin gene (TUB2), partial actin gene (ACT), and partial chitin synthase-1 gene (CHS1). The pathogenicity test was carried out on wounded and unwounded Korean radish (cv. Siraegimu and Osarimu), and Chinese cabbage (cv. Chuno and Smart) by inoculating with a spore suspension. All isolates except one C. truncatum isolate developed typical symptoms on both wounded and unwounded Korean radish. In Chinese cabbage, only the plants inoculated with C. higginsianum isolates developed symptoms regardless of the wound. This is the first report of anthracnose caused by C. truncatum on Korean radish in Korea.

The Design and Implementation of High Performance Intrusion Prevention Algorithm based on Signature Hashing (시그너처 해싱 기반 고성능 침입방지 알고리즘 설계 및 구현)

  • Wang, Jeong-Seok;Jung, Yun-Jae;Kwon, H-Uing;Chung, Kyu-Sik;Kwak, Hu-Keun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.209-220
    • /
    • 2007
  • IPS(Intrusion Prevention Systems), which is installed in inline mode in a network, protects network from outside attacks by inspecting the incoming/outgoing packets and sessions, and dropping the packet or closing the sessions if an attack is detected in the packet. In the signature based filtering, the payload of a packet passing through IPS is matched with some attack patterns called signatures and dropped if matched. As the number of signatures increases, the time required for the pattern matching for a packet increases accordingly so that it becomes difficult to develop a high performance US working without packet delay. In this paper, we propose a high performance IPS based on signature hashing to make the pattern matching time independent of the number of signatures. We implemented the proposed scheme in a Linux kernel module in a PC and tested it using worm generator, packet generator and network performance measure instrument called smart bit. Experimental results show that the performance of existing method is degraded as the number of signatures increases whereas the performance of the proposed scheme is not degraded.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Technical Issues and Solutions for Developing IoT Applications (IoT 애플리케이션 개발의 기술적 이슈 및 솔루션)

  • Shin, Dong Ha;Han, Seung Ho;La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.99-110
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and actuated. IoT applications typically provide smart services to users by interacting with multiple devices connected to the network and are designed by integrating multiple technologies such as sensor network, communication technologies, and software engineering. Moreover, since the concept of IoT has been introduced recently, most of the researches are in the beginning step, which is too early to be practically applied. Due to these facts, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. And, it is not straightforward to apply conventional project guidelines to IoT application development projects. Hence, there can be many difficulties to successfully complete the projects. Therefore, for successful completion of the projects, we analyze technical challenges occurring in all phases of the project lifecycle, i.e. project preparation stage and development stage. And, we propose the effective solutions to overcome the issues. To verify identified issues and presented solutions, we present the result of applying the solutions to an IoT application development. Through the case study, we evaluate how reasonable the unconventional technical issues are generated and analyze effectiveness of applying the solutions to the application.

Study of Multi-Resident Location Tracking Service Model Based on Context Information (상황정보 기반의 다중 거주자 위치 추적 서비스에 관한 연구)

  • Won, Jeong Chang;Man, Ko Kwang;Chong, Joo Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.141-150
    • /
    • 2014
  • In recent years, because of the development of ubiquitous technology in healthcare research is actively progress. Especially, healthcare service area is change to home for the elderly or patients from hospital. The technology to identify residents in a home is crucial for smart home application services. However, existing researches for resident identification have several problems. In this case, residents are needed to attach of various sensors on their body. Also relating private life, it is difficult to apply to resident's environment. In this paper, we used constraint-free sensor and unconscious sensor to solve these problems and we limited using of sensor and indoor environment in the way of working economical price systems. The way of multi-resident identification using only these limited sensors, we selected elements of personal identifications and suggested the methods in giving the weight to apply these elements to systems. And we designed the SABA mechanism to tract their location and identify the residents. It mechanism can distinguish residents through the sensors located each space and can finally identify them by using the records of their behaviors occurred before. And we applied the mechanism designed for applications to approve this location tracking system. We verified to the location tracking system performance according to the scenario.

A Study on Integrated Platform for Prevention of Disease and Insect-Pest of Fruit Tree (특용과수의 병해충 및 기상재해 방지를 위한 통합관리 플랫폼 설계에 대한 연구)

  • Kim, Hong Geun;Lee, Myeong Bae;Kim, Yu Bin;Cho, Yong Yun;Park, Jang Woo;Shin, Chang Sun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.347-352
    • /
    • 2016
  • Recently, IoT technology has been applied in various field. In particular, the technology focuses on analysing large amount of data that has been gathered from the environmental sensors, to provide valuable information. This technique has been actively researched in the agro-industrial sector. Many researches are underway in the monitoring and control for growth crop environment in agro-industrial. Normally, the average weather data is provided by the manual agro-control method but the value may differ due to the different region's weather and environment that may cause problem in the disease and insect-pest prevention. In order to develop a suitable integrated system for fruit tree, all the necessary information is obtained from the Jeollanam-do province, which has the high production rate in the Korea. In this paper, we propose an integrated support platform for the growing crops, to minimize the damage caused due to the weather disaster through image analysis, forecasting models, by using the micro-climate weather information collection and CCTV. The fruit tree damage caused by the weather disaster are controlled by utilizing various IoT technology by maintaining the growth environment, which helps in the disease and insect-pest prevention and also helps farmers to improve the expected production.

A Comparative Analysis of Cognitive Change about Big Data Using Social Media Data Analysis (소셜 미디어 데이터 분석을 활용한 빅데이터에 대한 인식 변화 비교 분석)

  • Yun, Youdong;Jo, Jaechoon;Hur, Yuna;Lim, Heuiseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.371-378
    • /
    • 2017
  • Recently, with the spread of smart device and the introduction of web services, the data is rapidly increasing online, and it is utilized in various fields. In particular, the emergence of social media in the big data field has led to a rapid increase in the amount of unstructured data. In order to extract meaningful information from such unstructured data, interest in big data technology has increased in various fields. Big data is becoming a key resource in many areas. Big data's prospects for the future are positive, but concerns about data breaches and privacy are constantly being addressed. On this subject of big data, where positive and negative views coexist, the research of analyzing people's opinions currently lack. In this study, we compared the changes in peoples perception on big data based on unstructured data collected from the social media using a text mining. As a results, yearly keywords for domestic big data, declining positive opinions, and increasing negative opinions were observed. Based on these results, we could predict the flow of domestic big data.

Status of Youth Entrepreneurship in Korea (국내 청년층의 창업인식 실태와 증대방안 - 청년층의 직업관을 중심으로)

  • Lee, Jae Hoon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.6
    • /
    • pp.1-8
    • /
    • 2014
  • The government has established a foundation activation measures across a total of 10 times to expanse job creation, promote new growth engines and enhance youth entrepreneurship for trying to spread socially. In order to improve startup activation policies and excavation, it is necessary to supplement the gaps going to construct a stable infrastructure through periodic status research on their occupational sense and entrepreneurship awareness. Since 2012, the government's has been surveyed to address the current understanding of the occupational sense and entrepreneurship awareness of population characteristics. Until 2013 only the youth were surveyed, recently from 2014 expanded its range to the public. This study laid the foundation for a more comprehensive set of analysis through which to learn and understand the differences between the status of each group for entrepreneurship awareness by utilizing survey data from the government. And this study was obtained from a survey of university students and the general public. A total of 3000 people nationwide survey was conducted about the entrepreneurship environment for start-ups and entrepreneurship awareness and success factors for a month. The University students survey result were classified according to the area, school and gender. And The general public survey was classified according to the area, the age and gender. Each response result indicates a significant difference between the students and the general public did not appear. But through this survey, This study would contribute the establishment of the national startup infrastructure.

  • PDF