• Title/Summary/Keyword: mobile device log

Search Result 27, Processing Time 0.025 seconds

The Study based on Accelerated Degradation Test of General Lighting 4W LED Lamp using External Converter (조명용 4W 컨버터 외장형 LED램프의 가속열화시험평가)

  • Park, Chang-Kyu;Oh, Geun-Tae
    • Journal of Applied Reliability
    • /
    • v.11 no.3
    • /
    • pp.267-279
    • /
    • 2011
  • LEDs have been used extensively in the mobile device, automobile, and general lighting because they are semi-permanent, long life, less power consumption, reliable and environmentally friendly. In this paper, the accelerated degradation test(ADT) for a general lighting 4W LED Lamp using external converter is considered. The conditions of ADT are high temperature and high humidity. We show that its life time is log-normally distributed with same parameters under both a normal condition and an accelerated condition, and also derive an accelerated factor.

Flash-Conscious Storage Management Method for DBMS using Dynamic Log Page Allocation (동적 로그 페이지 할당을 이용한 플래시-고려 DBMS의 스토리지 관리 기법)

  • Song, Seok-Il;Khil, Ki-Jeong;Choi, Kil-Seong
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.767-774
    • /
    • 2010
  • Due to advantages of NAND flash memory such as non-volatility, low access latency, low energy consumption, light weight, small size and shock resistance, it has become a better alternative over traditional magnetic disk drives, and has been widely used. Traditional DBMSs including mobile DBMSs may run on flash memory without any modification by using Flash Translation Layer (FTL), which emulates a random access block device to hide the characteristics of flash memory such as "erase-before-update". However, most existing FTLs are optimized for file systems, not for DBMSs, and traditional DBMSs are not aware of them. Also, traditional DBMSs do not consider the characteristics of flash memory. In this paper, we propose a flash-conscious storage system for DBMSs that utilizes flash memory as a main storage medium, and carefully put the characteristics of flash memory into considerations. The proposed flash-conscious storage system exploits log records to avoid costly update operations. It is shown that the proposed storage system outperforms the state.

DDoS Attack Application Detection Method with Android Logging System (안드로이드 로깅 시스템을 이용한 DDoS 공격 애플리케이션 탐지 기법)

  • Choi, Seul-Ki;Hong, Min;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1215-1224
    • /
    • 2014
  • Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.

Design of Open Gateway Framework for Personalized Healing Data Access (개인화된 힐링 데이터 접근을 위한 개방형 게이트웨이 프레임워크 설계)

  • Jeon, YoungJun;Im, SeokJin;Hwang, HeeJoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.229-235
    • /
    • 2015
  • ICT healing platform is based on bio-signal and life habit information target to alarm early sickness concept prevention chronic pain. ICT(Information & Communication Technology) healing platform target on personal lead health management care of several health agencies and open of the (hospital, fitness center, health examination center, personal health device) personal health information together to personal device. Support Analysis Platform and Open API to vitalization optional services. In this paper proposal to access personality healing data Open Gateway Framework of Healing Platform Adaptor (HPAdaptor) ICT healing platform means Data relaying link to EMR(Electronic health record), korean medicine, life log, wellness, chronic pain, and fineness several personal health data provider and service provider personal healing data with software engine. After Design HPAdaptor can use for data and service provider record storage, mobile platform and analytics platform need data service or platform relying reference model.

Research on Efficient Live Evidence Analysis System Based on User Activity Using Android Logging System (안드로이드 로그 시스템을 이용한 효율적인 사용자 행위기반 라이브 증거수집 및 분석 시스템 연구)

  • Hong, Il-Young;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.67-80
    • /
    • 2012
  • Recently as the number of smartphone user is growing rapidly, android is also getting more interest in digital forensic. However, there is not enough research on digital data acquisition and analysis based on android platform's unique characteristics so far. Android system stores all the related recent systemwide logs from the system components to applications in volatile memory, and therefore, the logs can potentially serve as important evidences. In this paper, we propose a digital data acquisition and analysis system for android which extracts meaningful information based on the correlation of android logs and user activities from a device at runtime. We also present an efficient search scheme to facilitate realtime analysis on site. Finally, we demonstrate how the proposed system can be used to reconstruct the sequence of user activities in a more intuitive manner, and show that the proposed search scheme can reduce overall search and analysis time approximately 10 times shorter than the normal regular search method.

Context Adaptive User Interface Generation in Ubiquitous Home Using Bayesian Network and Behavior Selection Network (베이지안 네트워크와 행동 선택 네트워크를 이용한 유비쿼터스 홈에서의 상황 적응적 인터페이스 생성)

  • Park, Han-Saem;Song, In-Jee;Cho, Sung-Bea
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.573-578
    • /
    • 2008
  • Recently, we should control various devices such as TV, audio, DVD player, video player, and set-top box simultaneously to manipulate home theater system. To execute the function the user want in this situation, user should know functions and positions of the buttons in several remote controllers. Normally, people feel difficult due to these realistic problems. Besides, the number of the devices that we can control shall increase, and people will confuse more if the ubiquitous home environment is realized. Therefore, user adaptive interface that provides the summarized functions is required. Moreover there can be a lot of mobile and stationary controller devices in ubiquitous computing environment, so user interface should be adaptive in selecting the functions that user wants and in adjusting the features of UI to fit in specific controller. To implement the user and controller adaptive interface, we modeled the ubiquitous home environment and used modeled context and device information. We have used Bayesian network to get the degree of necessity in each situation. Behavior selection network uses predicted user situation and the degree of necessity, and it selects necessary functions in current situation. Selected functions are used to construct adaptive interface for each controller using presentation template. For experiments, we have implemented ubiquitous home environment and generated controller usage log in this environment. We have confirmed the BN predicted user requirements effectively as evaluating the inferred results of controller necessity based on generated scenario. Finally, comparing the adaptive home UI with the fixed one to 14 subjects, we confirmed that the generated adaptive UI was more useful for general tasks than fixed UI.

  • PDF

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.