• Title/Summary/Keyword: smart device

Search Result 2,252, Processing Time 0.031 seconds

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

Optical thyristor operating at 1.55 μm (장파장에서 동작하는 Optical Thyristor)

  • Kim, Doo-Gun;Kim, Hyung-Soo;Jung, Sung-Jae;Choi, Young-Wan;Lee, Seok;Woo, Deok-Ha;Jhon, Young-Min;Yu, Byung-Geel
    • Korean Journal of Optics and Photonics
    • /
    • v.13 no.2
    • /
    • pp.146-150
    • /
    • 2002
  • 1.55${\mu}{\textrm}{m}$ PnpN optical thyristor as a smart optical switch has potential applications in advanced optical communication systems. PnpP optical thyristors operating at 1.55${\mu}{\textrm}{m}$ are proposed and fabricated for the first time. In the optical thyristors, we employ InGaAs/InP multiple quantum well (MQW) for the active n- and p-layers. The thyristors show sufficiently nonlinear s-shape I-V characteristics and spontaneous emission. In the OFF-state, the device has a high-impedance up to switching voltage of 4.03(V). On the other hand, it has low-impedance and emits spontaneous light as a light-emitting diode in the ON-state voltage of 1.77(V), and switching voltage is changed under several light input conditions. It can be used as a header processor in optical asynchronous transfer mode (ATM), as a hard limiter in optical code division multiple access (CDMA) and as a wavelength converter in optical WDM systems.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

A Study on Apparatus of Human Body Antenna for Mine Detection (지뢰탐지용 휴먼바디 안테나 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.269-272
    • /
    • 2015
  • this is the study of the human body antenna device which can detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal using superhigh frequency RF beam equipped with the body. and it is able to transmit the data of the detection of the powder, battle combats can share that among them. with its flexible roof radial antenna structure, it emits the superhigh frequency RF beam to the front and flank multiply, preprocesses through the powder preprocessing part. and with the non-linear regression model algorism engine part, reflecting the attenuation characteristics depend on the delayed time of degree of the signal power which is received to the superhigh frequency RF beam. so it is able to detect the signal of the most likely mine or powder based on the degree of the answer signal power according to the delayed time of the superhigh frequency RF beam. also, it can detect the powder whether it is metal or nonmetal, mine, dud, VBIED. it can increase the chance of detection about 90% more than existing mine detector.

Multimedia Application and Ubiquitous English Education Environment (멀티미디어 기기 활용과 유비쿼터스 영어 교육환경)

  • Choi, Michelle Mi-Hee
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.393-399
    • /
    • 2012
  • New and creative skills must be developed, and adapted into a lesson, to motivate learners to acquire a second language easily and enjoyment, Multimedia tools which are of interest to learners, such as; smart phones, computers, and notebooks with wireless internet compatability, will provide learners opportunities to study, and do their work practically anywhere and anytime. Recently, podcasts, which are a type of digital media, consisting of a series of audio episodes or video files, subscribed to and downloaded through web syndication, or streamed online to a computer or mobile device, are used to facilitate ESL (English as a Second Language) learning. Development of a variety of teaching methods, using multimedia tools, is needed. There are advantages and disadvantages to using a variety of multimedia tools. The current research aims to study its characteristics and application, in order to maximize their effective use, in English education. The current study suggests a ubiquitous learning environment using multimedia content tools, internet media, video teleconferencing, cyber-learning, and one-to-one videos used in conjunction with, or as a digital textbook for the English lesson. This study also investigates future educational changes, using state-of-the-art equipment for the self-learning experience, and will present a new direction in English education, through a variety of instructional devices and a marginalized class system model.

A Design and Development of Big Data Indexing and Search System using Lucene (루씬을 이용한 빅데이터 인덱싱 및 검색시스템의 설계 및 구현)

  • Kim, DongMin;Choi, JinWoo;Woo, ChongWoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.107-115
    • /
    • 2014
  • Recently, increased use of the internet resulted in generation of large and diverse types of data due to increased use of social media, expansion of a convergence of among industries, use of the various smart device. We are facing difficulties to manage and analyze the data using previous data processing techniques since the volume of the data is huge, form of the data varies and evolves rapidly. In other words, we need to study a new approach to solve such problems. Many approaches are being studied on this issue, and we are describing an effective design and development to build indexing engine of big data platform. Our goal is to build a system that could effectively manage for huge data set which exceeds previous data processing range, and that could reduce data analysis time. We used large SNMP log data for an experiment, and tried to reduce data analysis time through the fast indexing and searching approach. Also, we expect our approach could help analyzing the user data through visualization of the analyzed data expression.

A Study of Co-Working Space Operation Strategy: Focused on Operation Elements Analysis by AHP Method (코워킹스페이스 운영전략 연구: AHP 기법을 통한 운영요소 분석을 중심으로)

  • Seo, Jong-Seok;Lee, Geun-Choon;Ock, Young-Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.4
    • /
    • pp.157-165
    • /
    • 2015
  • The purpose of this study is to suggest a successful operating strategy of co-working space. Therefore, the operating elements were identified through a literature research. And then, verified through site investigation and interview of operation managers. We found out that the high level operating elements are 'Co-working management', 'Membership management' and 'Supporting management' And the low level elements of Co-working management are 'Relationship facilitation', 'Networking event & Party' and 'Community & Communication', Membership management's are 'Service diversity & Price plan', 'Promotion & PR' and 'Alliance & Partnership', Supporting management's are 'Space & Interior', 'Facility & Device, Solution' and 'Mentoring & Education'. And the questionnaire was designed and conducted to Co-working space operators through the AHP method. As a result of the collected data analyzing, the highest priority was the operational element 'Community & Communication', and 'space and interior' is next, 'Service diversity & Price plan' is the third. The results were discussed with the relevant experts and it presents the following operating strategies. First, to create an environment suitable to voluntary coworking is the most important element. In particular, good management of 'Community & Communication' should be considered as a high priority operations strategy in a coworking space. Second, interior and space utilization helps in making the environment and atmosphere conducive to coworking. Office devices and facilities such as IT infra, printer, fax, scan, paper...etc are also important elements. But the reason why these necessary items are given a low priority is that these items don't need any special strategy. Third, in order to create a stable profit, 'Service diversity & Price plan' should be the characteristics of each coworking space because it will attract and secure enough customers. This study is valuable, it could be a great guideline for coworking space in an early stage to adopt operating model and strategy

  • PDF

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Design of Bias Circuit for Measuring the Multi-channel ISFET (다채널 ISFET 측정용 단일 바이어스 회로의 설계)

  • Cho, Byung-Woog;Kim, Young-Jin;Kim, Chang-Soo;Choi, Pyung;Sohn, Byung-Ki
    • Journal of Sensor Science and Technology
    • /
    • v.7 no.1
    • /
    • pp.31-38
    • /
    • 1998
  • Multi-channel sensors can be used to increase the reliability and remove the random iloise in ion-sensitive field effect transistors(ISFETs). Multi-channel sensors is also an essential step toward potential fabrication of sensors for several ionic species in one device. However, when the multi-channel sensors are separately biased, the biasing problems become difficult, that is to say, the bias circuit is needed as many sensors. In this work, a circuit for biasing the four pH-ISFETs in null-balance method, where bias voltages are switched, was proposed. The proposed concept is need only one bias circuit for the four sensors. Therefore it has advantages of smaller size and lower power consumption than the case that all sensors are separately biased at a time. The proposed circuit was tested with discrete devices and its performance was investigated. In the recent trend, sensor systems are implemented as portable systems. So the verified measurement circuit was integrated by using the CMOS circuit. Fortunately, ISFET fabrication process can be compatible with CMOS process. Full circuit has a mask area of $660{\mu}m{\times}500{\mu}m$. In the future, this step will be used for developing the smart sensor system with ISFET.

  • PDF

A Study of Instruction of Internet(IoI)-based Collaborative Learning Method in Elementary School Sixth Grade Mathematics Class (초등학교 6학년 수학수업에서의 수업인터넷 기반 협력학습 수업방법 탐색)

  • Choi, Byoung-Hoon;Yoon, Heon-Chul
    • Journal of Science Education
    • /
    • v.41 no.2
    • /
    • pp.248-266
    • /
    • 2017
  • The purpose of this study is to present various examples of collaborative learning based on the Instruction of Internet in the 6th grade elementary school mathematics class. So we introduce the design method of classroom environment for classroom Internet and give example of various teaching methods. This study was conducted for nine months from March to November, 2016, one sixth grade of elementary school in D area. During this period, we conducted Instruction of Internet-based collaborative learning to classify typical teaching cases. We classified into 5 type collaborative learning. First, collaborative learning in the classroom. Second, remote collaborative learning between classroom and classroom. Third, Live participation classes. Forth, project collaborative learning. Fifth, using virtual reality in collaborative learning. In addition, we could identify that there is a difference compared to the conventional learning. It became possible to conduct collaborative learning with other students simultaneously or have opening class with both parents and teachers by using Youtube. These examples can be presented as a case to depart from traditional mathematics class in one classroom. In this regard, we will be able to provide several implications about teaching methods utilizing smart device and Internet in future classroom.