• Title/Summary/Keyword: app detection

Search Result 105, Processing Time 0.024 seconds

Design of The Wearable Device considering ICT-based Silver-care (ICT 기반 실버케어를 고려한 웨어러블 디바이스 설계)

  • Lee, Min-hye;Shin, Seong-yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1347-1354
    • /
    • 2018
  • A bedridden patients, elderly people, and dementia who are subject to special care at a medical institution can not handle the feces themselves and need the help of a guardian or care-giver. In particular, toxic substances are contained in the stools, which can cause eczema, dermatitis and urticaria, so it is important to replace diapers. In this paper, we propose a wearable device design for the detection of excretions in consideration of the various excretion requirements of the elderly. The device is a form in which a module are attached to an adult diaper used in a nursing hospital to detect excreta, and the presence or absence of a wearer can be confirmed by an LED. The measured data is transmitted to the smartphone app in real time via Bluetooth in the module and can be checked for popup notification. The validity of this study was verified by comparing the actual excretion with the data collected through the designed module.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

SANET-CC : Zone IP Allocation Protocol for Offshore Networks (SANET-CC : 해상 네트워크를 위한 구역 IP 할당 프로토콜)

  • Bae, Kyoung Yul;Cho, Moon Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-109
    • /
    • 2020
  • Currently, thanks to the major stride made in developing wired and wireless communication technology, a variety of IT services are available on land. This trend is leading to an increasing demand for IT services to vessels on the water as well. And it is expected that the request for various IT services such as two-way digital data transmission, Web, APP, etc. is on the rise to the extent that they are available on land. However, while a high-speed information communication network is easily accessible on land because it is based upon a fixed infrastructure like an AP and a base station, it is not the case on the water. As a result, a radio communication network-based voice communication service is usually used at sea. To solve this problem, an additional frequency for digital data exchange was allocated, and a ship ad-hoc network (SANET) was proposed that can be utilized by using this frequency. Instead of satellite communication that costs a lot in installation and usage, SANET was developed to provide various IT services to ships based on IP in the sea. Connectivity between land base stations and ships is important in the SANET. To have this connection, a ship must be a member of the network with its IP address assigned. This paper proposes a SANET-CC protocol that allows ships to be assigned their own IP address. SANET-CC propagates several non-overlapping IP addresses through the entire network from land base stations to ships in the form of the tree. Ships allocate their own IP addresses through the exchange of simple requests and response messages with land base stations or M-ships that can allocate IP addresses. Therefore, SANET-CC can eliminate the IP collision prevention (Duplicate Address Detection) process and the process of network separation or integration caused by the movement of the ship. Various simulations were performed to verify the applicability of this protocol to SANET. The outcome of such simulations shows us the following. First, using SANET-CC, about 91% of the ships in the network were able to receive IP addresses under any circumstances. It is 6% higher than the existing studies. And it suggests that if variables are adjusted to each port's environment, it may show further improved results. Second, this work shows us that it takes all vessels an average of 10 seconds to receive IP addresses regardless of conditions. It represents a 50% decrease in time compared to the average of 20 seconds in the previous study. Also Besides, taking it into account that when existing studies were on 50 to 200 vessels, this study on 100 to 400 vessels, the efficiency can be much higher. Third, existing studies have not been able to derive optimal values according to variables. This is because it does not have a consistent pattern depending on the variable. This means that optimal variables values cannot be set for each port under diverse environments. This paper, however, shows us that the result values from the variables exhibit a consistent pattern. This is significant in that it can be applied to each port by adjusting the variable values. It was also confirmed that regardless of the number of ships, the IP allocation ratio was the most efficient at about 96 percent if the waiting time after the IP request was 75ms, and that the tree structure could maintain a stable network configuration when the number of IPs was over 30000. Fourth, this study can be used to design a network for supporting intelligent maritime control systems and services offshore, instead of satellite communication. And if LTE-M is set up, it is possible to use it for various intelligent services.

Condition of ex situ Bioremediation of Polycyclic Aromatic Hydrocarbons in Marine Sediments (해양퇴적토내 다환방향족탄화수소 생분해 증진 조건 연구)

  • Jung, Hong-Bae;Yun, Tian;Lee, Hee-Soon;Kwon, Kae-Kyoung;Kim, Sang-Jin
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.8 no.4
    • /
    • pp.179-185
    • /
    • 2005
  • Polycyclic aromatic hydrocarbons (PAHs) are a kind of toxic environmental pollutants and has been accumulated usually in marine sediments. Due to their potential hazardous to human, removal of PAHs from environments has been great concern. In the present study, the effect of microbial inoculation and the supplementation of mixed form cyclodextrin (M-CD) was assessed in the pre-sterilized or nonsterilized microcosms for optimizing operational conditions for ex situ bioremediation of sediments contaminated by PAHs. Activity of electron transport system (ETSA) was increased by the addition of M-CD regardless of inoculation of microorganisms in microcosms without sterilization. The degradation rate of PAHs in sterilized microcosms was app. 9-20% by the inoculation of single strain and 24-37% by the inoculation of microbial consortium supplemented with 1% M-CD, respectively. The degradation was not observed in microcosms without sterilization under the same conditions. The proportion of inoculated microorganisms also decreased in nonsterilized microcosms. Signals of inoculated bacteria were decreased to detection limit after 2 days in the microcosms without M-CD. In conclusion, microbial inoculation with appropriate carbon sources and removal of natural flora and grazers are required for the efficient ex situ bioremediation of sediments contaminated by PAHs in bioslurry reactor.

  • PDF

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.