• Title/Summary/Keyword: User Data Detecting

Search Result 112, Processing Time 0.036 seconds

System and method for detecting gas using smart-phone (스마트폰을 이용한 가스검출시스템 및 검출 방법연구)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.2
    • /
    • pp.129-137
    • /
    • 2015
  • This study is in regard to the gas detection system and gas detection method utilizing smart phone. This study includes; 1) the sensor module attached to the smart phone to detect and measure flammable gas or toxic gas; and 2) gas detection APP which is installed inside the smart phone and recognizes the user information and location information automatically by reading RFID tag indicating the user or the location to detect gas through the contact area where RFID and blue tooth reader is installed inside of the above mentioned smart phone, and then measures the combustible gas or toxic gas by operating above mentioned sensor module and obtains the data thus measured, and above mentioned smart phone is characterized by its transmission of the above mentioned user information, location information and measured data which are obtained by above mentioned gas detecting APP to operation server via communication network. With this, reliability for the location detecting gas by the user, the result of the measurement, etc. can be secured. Furthermore, this provides the effect of preventing artificial manipulation at the time of input which is associated with the identification of the user to be measured by utilizing removable sensor module and application or the mistake resulted from wrong input by the user. In addition, by transmitting the measured data from the sensor module carrying out gas detection to operation server, this provides the effect of making it possible to process the data thus collected to a specialized data for combustible gas or toxic gas.

User Key-based Fragile Watermarking for Detecting Image Modification (영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹)

  • Im, Jae-Hyeon;Sim, Hyeok-Jae;Jeon, Byeong-U
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.474-485
    • /
    • 2001
  • This paper proposes a user-key-based fragile watermarking for detecting image modification. The embedding data in a form of binary image for authentication are inserted to the DCT coefficients of each block of the given image. To minimize possible exposure of being watermarked and the location of insertion, it is proposed to utilize a user-specific key in randomizing those information. Each DCT block hides one bit of data, all of which represent the user-specific authentication data. Experiments with 5 real images demonstrate that the proposed method not only detects whether there is modification or not, but also the actual location of modification with minimal visual deterioration. However, the proposed method has room for improvement against its loss of watermark by an attack of compression by more than 50%.

  • PDF

Detecting user status from smartphone sensor data

  • Nguyen, Thu-Trang;Nguyen, Thi-Hau;Nguyen, Ha-Nam;Nguyen, Duc-Nhan;Choi, GyooSeok
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.28-30
    • /
    • 2016
  • Due to the high increment in usage and built-in advanced technology of smartphones, human activity recognition relying on smartphone sensor data has become a focused research area. In order to reduce noise of collected data, most of previous studies assume that smartphones are fixed at certain positions. This strategy is impractical for real life applications. To overcome this issue, we here investigate a framework that allows detecting the status of a traveller as idle or moving regardless the position and the direction of smartphones. The application of our work is to estimate the total energy consumption of a traveller during a trip. A number of experiments have been carried out to show the effectiveness of our framework when travellers are not only walking but also using primitive vehicles like motorbikes.

A User Movement Direction Detecting Method through Data Analysis of BLE Beacons and Its Implementation

  • Choe, Jong-gak;Kwon, YongJin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4908-4922
    • /
    • 2019
  • The popularization of smartphones in recent years has created a rich ground for online-to-offline (O2O) services based on location information. In the process of finding user locations in O2O services, BLE (Bluetooth Low Energy) beacons are widely used because the beacons are economical in many ways. The current BLE method does not specify the direction of user movement, but adding that information could enrich the user experience for various O2O services. This paper proposes a method that identifies the user movement direction through data analysis on data sets generated by a pair of BLE beacons. Also we demonstrate its implementation with examples of services that need the direction information of users in order to show the feasibility of the method proposed.

Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.74-80
    • /
    • 2015
  • In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.

A Study on Weldability Estirmtion of Laser Welded Specimens by Vision Sensor (비전 센서를 이용한 레이져 용접물의 용접성 평가에 관한 연구)

  • 엄기원;이세헌;이정익
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.10a
    • /
    • pp.1101-1104
    • /
    • 1995
  • Through welding fabrication, user can feel an surficaial and capable unsatisfaction because of welded defects, Generally speaking, these are called weld defects. For checking these defects effectively without time loss effectively, weldability estimation system setup isan urgent thing for detecting whole specimen quality. In this study, by laser vision camera, catching a rawdata on welded specimen profiles, treating vision processing with these data, qualititative defects are estimated from getting these information at first. At the same time, for detecting quantitative defects, whole specimen weldability estimation is pursued by multifeature pattern recognition, which is a kind of fuzzy pattern recognition. For user friendly, by weldability estimation results are shown each profiles, final reports and visual graphics method, user can easily determined weldability. By applying these system to welding fabrication, these technologies are contribution to on-line weldability estimation.

  • PDF

Predicting User Attitude Based On Smartphone Usage (스마트 폰 사용에 따른 사용자의 태도 예측)

  • Sokasane, Rajashree S.;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1136-1138
    • /
    • 2014
  • Recently, predicting personality with the help of smartphone usage is become very interesting and attention grabbing topic in the field of research. At present there are some approaches towards detecting a user's personality which uses the smartphones usage data, such as call detail records (CDRs), the usage of short message services (SMSs) and the usage of social networking services application. In this paper, we focus on the predicting user attitude based on MBTI theory by using their smartphone usage data. We used Naïve Bayes and SVM classifier for classifying user personalities by extracting some features from smartphone usage data. From analysis it is observed that, SVM classifier works well as compared to Naïve Bayes.

System of gas sensor for conbinating wire and wireless using Internet of Things (IOT기술을 이용한 유무선 통합 가스검출 시스템 구현)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.297-304
    • /
    • 2015
  • This study concerns the integrated gas sensor system of wire and wireless communication by using IoT(Internet of Things) technology. First, communication part is that it delivers the detection information, which transferred by wire or wireless communication and required control procedure based on a wireless module that receives the gas leakage information from wired or wireless detector, to administrator or user's terminal. Second, receiver part is that it shows the location and information, which received from the wired detector formed by a detecting sensor's node as linking with the communication part, and transfers these to the communication part. Third, wireless detector formed as a communication module of a detecting sensor node is that it detects gas leakage and transfers the information through wireless as a packet.Fourth, wired detector communicated with the receiver part and formed as a communication module of a detecting sensor node is that it detects gas leakage, transfers and shows the information as a packet. Fifth, administrator's terminal is that it receives gas leakage information by the communication part, transfers the signal by remote-control, and shut off a gas valve as responding the information. Sixth, database is that it is connected with the communication part; it sets and stores the default values for detecting smoke, CO., and temperature; it transfers this information to the communication part or sends a gas detecting signal to user's terminal. Seventh, user's terminal is that it receives each location's default value which stored and set at the database; it manages emergency situation as shutting off a gas valve through remote control by corresponding each location's gas leakage information, which transferred from the detector to the communication part by wireless.It is possible to process a high quality data regarding flammable or toxic gas by transferring the data, which measured by a sensor module of detector, to the communication part through wire and wireless. And, it allows a user to find the location by a smart phone where gas leaks. Eventually, it minimizes human life or property loss by having stability on gas leakage as well as corresponding each location's information quickly.

Developing a Framework for Detecting Phishing URLs Using Machine Learning

  • Nguyen Tung Lam
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.157-163
    • /
    • 2023
  • The attack technique targeting end-users through phishing URLs is very dangerous nowadays. With this technique, attackers could steal user data or take control of the system, etc. Therefore, early detecting phishing URLs is essential. In this paper, we propose a method to detect phishing URLs based on supervised learning algorithms and abnormal behaviors from URLs. Finally, based on the research results, we build a framework for detecting phishing URLs through end-users. The novelty and advantage of our proposed method are that abnormal behaviors are extracted based on URLs which are monitored and collected directly from attack campaigns instead of using inefficient old datasets.

Autonomous Mobile Robot Control using the Wearable Devices Based on EMG Signal for detecting fire (EMG 신호 기반의 웨어러블 기기를 통한 화재감지 자율 주행 로봇 제어)

  • Kim, Jin-Woo;Lee, Woo-Young;Yu, Je-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.3
    • /
    • pp.176-181
    • /
    • 2016
  • In this paper, the autonomous mobile robot control system for detecting fire was proposed using the wearable device based on EMG(Electromyogram) signal. Myo armband is used for detecting the user's EMG signal. The gesture was classified after sending the data of EMG signal to a computer using Bluetooth communication. Then the robot named 'uBrain' was implemented to move by received data from Bluetooth communication in our experiment. 'Move front', 'Turn right', 'Turn left', and 'Stop' are controllable commands for the robot. And if the robot cannot receive the Bluetooth signal from a user or if a user wants to change manual mode to autonomous mode, the robot was implemented to be in the autonomous mode. The robot flashes the LED when IR sensor detects the fire during moving.