• Title/Summary/Keyword: Software availability

Search Result 257, Processing Time 0.024 seconds

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

A study on CFRP based lightweight House deck structure design and configuration of Deck body connected IoT sensor data acquisition devices

  • Jaesang Cha;Chang-Jun Ahn;Quoc Cuong Nguyen;Yunsik Lim;Hyejeong Cho;Seung Youn Yang;Juphil Cho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.250-260
    • /
    • 2023
  • In this paper, we designed a IoT(Internet of Things) sensor block embedded lightweight house deck structures that can be implemented using Carbon Fiber Reinforced Polymer(CFRP). Deck-Sensor interconnection interface block via IoT connectivity Hub that can mount external environmental sensors such as fire sensors on the Deck body itself was also proposed. Additionally we described the configuration of devices for data acquisition and analysis based on IoT environmental detection sensors that can be commonly installed and used on these deck bodies. On the other hand, received sensing data based monitoring user interface(UI) also developed and used for sensing data analysis for remote monitoring center. Through the implementation of such IoT-based sensor data transmission and collection analysis devices and UI software, this paper confirmed the availability of CFRP based lightweight House deck structure and possibility of CFRP deck-based IoT sensor data networking and analysis functions.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

Machine learning application in ischemic stroke diagnosis, management, and outcome prediction: a narrative review (허혈성 뇌졸중의 진단, 치료 및 예후 예측에 대한 기계 학습의 응용: 서술적 고찰)

  • Mi-Yeon Eun;Eun-Tae Jeon;Jin-Man Jung
    • Journal of Medicine and Life Science
    • /
    • v.20 no.4
    • /
    • pp.141-157
    • /
    • 2023
  • Stroke is a leading cause of disability and death. The condition requires prompt diagnosis and treatment. The quality of care provided to patients with stroke can vary depending on the availability of medical resources, which in turn, can affect prognosis. Recently, there has been growing interest in using machine learning (ML) to support stroke diagnosis and treatment decisions based on large medical data sets. Current ML applications in stroke care can be divided into two categories: analysis of neuroimaging data and clinical information-based predictive models. Using ML to analyze neuroimaging data can increase the efficiency and accuracy of diagnoses. Commercial software that uses ML algorithms is already being used in the medical field. Additionally, the accuracy of predictive ML models is improving with the integration of radiomics and clinical data. is expected to be important for improving the quality of care for patients with stroke.

Software Development for Dynamic Positron Emission Tomography : Dynamic Image Analysis (DIA) Tool (동적 양전자방출단층 영상 분석을 위한 소프트웨어 개발: DIA Tool)

  • Pyeon, Do-Yeong;Kim, Jung-Su;Jung, Young-Jin
    • Journal of radiological science and technology
    • /
    • v.39 no.3
    • /
    • pp.369-376
    • /
    • 2016
  • Positron Emission Tomography(PET) is nuclear medical tests which is a combination of several compounds with a radioactive isotope that can be injected into body to quantitatively measure the metabolic rate (in the body). Especially, Phenomena that increase (sing) glucose metabolism in cancer tissue using the $^{18}F$-FDG (Fluorodeoxyglucose) is utilized widely in cancer diagnosis. And then, Numerous studies have been reported that incidence seems high availability even in the modern diagnosis of dementia and Parkinson's (disease) in brain disease. When using a dynamic PET iamge including the time information in the static information that is provided for the diagnosis many can increase the accuracy of diagnosis. For this reason, clinical researchers getting great attention but, it is the lack of tools to conduct research. And, it interfered complex mathematical algorithm and programming skills for activation of research. In this study, in order to easy to use and enable research dPET, we developed the software based graphic user interface(GUI). In the future, by many clinical researcher using DIA-Tool is expected to be of great help to dPET research.

A Study on Availability of AtoM for Recording Korean Wave Culture Contents : A Case of K-Food Contents (한류문화콘텐츠의 기록화를 위한 AtoM 활용 방안에 관한 연구 K-Food 콘텐츠를 중심으로)

  • Shim, Gab-yong;Yoo, Hyeon-Gyeong;Moon, Sang-Hoon;Lee, Youn-Yong;Lee, Jeong-Hyeon;Kim, Yong
    • The Korean Journal of Archival Studies
    • /
    • no.43
    • /
    • pp.5-42
    • /
    • 2015
  • Korean wave 3.0 is focused on 'K-Culture' which includes traditional culture, cultural art as well as existing culture contents as a keyword. It considers everything about Korean culture as materials of Korean wave culture contents. Since Korean wave culture contents reflect contemporary social aspect, it needs to preserve those contents as archives and records which have the important value of evidence. With this social environment, this study aims to implement RMS based on AtoM that manages various kinds of Korean wave culture contents through analysis of management situation of those materials. Recently, it is in progress individually to manage them through organizations dealing with korean cultures such as K-Pop, K-Food, K-Movie. However, it has problems in accumulating information and reproducing high quality contents because of lack of coordination among organizations. To solve the problems, this study proposed RMS based on open source software Access to Memory(AtoM) for managing and recording Korean wave culture contents. AtoM provides various functions for managing records and archives such as accumulation, classification, description and browsing. Furthermore AtoM is for free as open source software and easy to implement and use. Thus, this study implemented RMS based on AtoM to methodically manage korean wave culture contents by functional requirements of RMS. Also, this study considered contents relating K-Food as an object to collect, classify, and describe. To describe it, this study selected ISAD(G) standard.

A Case Study of Software Architecture Design by Applying the Quality Attribute-Driven Design Method (품질속성 기반 설계방법을 적용한 소프트웨어 아키텍처 설계 사례연구)

  • Suh, Yong-Suk;Hong, Seok-Boong;Kim, Hyeon-Soo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.121-130
    • /
    • 2007
  • in a software development, the design or architecture prior to implementing the software is essential for the success. This paper presents a case that we successfully designed a software architecture of radiation monitoring system (RMS) for HANARO research reactor currently operating in KAERI by applying the quality attribute-driven design method which is modified from the attribute-driven design (ADD) introduced by Bass[1]. The quality attribute-driven design method consists of following procedures: eliciting functionality and quality requirements of system as architecture drivers, selecting tactics to satisfy the drivers, determining architectures based on the tactics, and implementing and validating the architectures. The availability, maintainability, and interchangeability were elicited as duality requirements, hot-standby dual servers and weak-coupled modulization were selected as tactics, and client-server structure and object-oriented data processing structure were determined at architectures for the RMS. The architecture was implemented using Adroit which is a commercial off-the-shelf software tool and was validated based on performing the function-oriented testing. We found that the design method in this paper is an efficient method for a project which has constraints such as low budget and short period of development time. The architecture will be reused for the development of other RMS in KAERI. Further works are necessary to quantitatively evaluate the architecture.

The Impact of Block Chain Characteristics on the Intention to Use Hotel Reservation System in China (중국에서의 호텔예약 시스템의 블록체인 특성이 사용의도에 미치는 영향)

  • JIN, Peng-Ru;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.8
    • /
    • pp.33-44
    • /
    • 2019
  • Purpose - As the scope of existing digital transformation expanded to various degrees, the Fourth Industrial Revolution came into being. In 2016, Klaus Schwab, Chairman of the World Economic Forum (WEF), said that the new technologies that lead the fourth industrial revolution are AI, Block chain, IoT, Big Data, Augmented Reality, and Virtual Reality. This technology is expected to be a full-fledged fusion of digital, biological and physical boundaries. Everything in the world is connected to the online network, and the trend of 'block chain' technology is getting attention because it is a core technology for realizing a super connective society. If the block chain is commercialized at the World Knowledge Forum (WKF), it will be a platform that can be applied to the entire industry. The block chain is rapidly evolving around the financial sector, and the impact of block chains on logistics, medical services, and public services has increased beyond the financial sector. Research design, data, and methodology - Figure analysis of data and social science analytical software of IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used for all the data researched. Data were collected from hotel employees in China from 25th March to 10th May. Results - The purpose of this study is to investigate the effect of the block chain characteristics of the existing hotel reservation system on the intention to use and to examine the influence of the block chain characteristics of the hotel reservation system on the intention to use, We rearranged the variables having the same or similar meaning and analyzed the effect of these factors on the intention to use the block chain characteristic of the hotel reservation system. 339 questionnaires were used for analysis. Conclusions - There are only sample hotel workers in this study, and their ages are in their 20s and 30s. In future studies, samples should be constructed in various layers and studied. In this study, the block chain characteristics are set as five variables as security, reliability, economical efficiency, availability, and diversity. Among them, Security and reliability made positive effects on the perceived usefulness. Also, security and economics did on the perceived ease. Availability and diversity did on both perceived usefulness and perceived ease. Perceived ease did on perceived usefulness. And perceived ease and perceived usefulness did on user intent. But security and economics did not on the perceived usefulness