• Title/Summary/Keyword: 논리적 데이터베이스

Search Result 158, Processing Time 0.024 seconds

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증

  • Jang, Do-Won;Kim, Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.547-556
    • /
    • 2005
  • 본 논문에서는 출입국자 관리의 효율성과 제계적인 출입국 관리를 위하여 여권 코드를 자동으로 인식하고 위조 여권을 판별할 수 있는 여권 인식 및 얼굴 인증 방법을 제안한다. 여권 이미지가 기울어진 상태로 스캔되어 획득되어질 경우 개별 코드 인식과 얼굴 인증에 많은 영향을 미칠 수도 있으므로 기울기 보정은 문자 분할 및 인식, 얼굴 인증에 있어 매우 중요하다. 따라서 본 논문에서는 여권 영상을 스미어링한 후, 추출된 문자열 중에서 가장 긴 문자열을 선택하고 이 문자열의 좌측과 우측 부분의 두께 중심을 연결하는 직선과 수평선과의 기울기를 이용하여 여권 영상에 대한 각도 보정을 수행한다. 여권 모드 추출은 소벨 연산자와 수평 스미어링, 8 방향 윤곽선 추적 알고리즘을 적용하여 여권 코드의 문자열 영역을 추출하고, 추출된 여권 코드 문자열 영역에 대해 반복 이지화 방법을 적용하여 코드의 문자열 영역을 이진화한다. 이진화된 문자열 영역에 대해 CDM 마스크를 적용하여 문자열의 코드들을 복원하고 8 방향 윤곽선 추적 알고리즘을 적용하여 개별 코드를 추출한다. 추출된 개별 코드 인식은 개선된 RBF 네트워크를 제안하여 적용한다. 제안된 RBF 네트워크는 퍼지 논리 접속 연산자를 이용하여 경계변수를 통적으로 조정하는 개선된 퍼지 ART 알고리즘을 제안하여 RBF 네트워크의 중간층으로 적용한다. 얼굴 인증을 위해서는 얼굴 인증에 가장 보편적으로 사용되는 PCA 알고리즘을 적용한다. PCA 알고리즘은 고차원의 벡터를 저 차원의 벡터로 감량하여 전체 입력 영상들의 직교적인 공분산행렬을 계산한 후 그것의 고유 값에 따라 각 영상의 고유벡터를 구하므로 PCA 알고리즘을 적용하여 얼굴의 고유 벡터를 구한 후 특징 벡터를 추출한다. 따라서 여권 영상에서 획득되어진 얼굴 영상의 특징벡터와 데이터베이스에 있는 얼굴 영상의 특징벡터와의 거리 값을 계산하여 사진 위조 여부를 판별한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능을 평가를 위하여 원본 여권에서 얼굴 부분을 위조한 여권과 기울어진 여권 영상을 대상으로 실험한 결과, 제안된 방법이 여권의 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.

  • PDF

Discrimination model of cultivation area of Corni Fructus using a GC-MS-Based metabolomics approach (GC-MS 기반 대사체학 기법을 이용한 산수유의 산지판별모델)

  • Leem, Jae-Yoon
    • Analytical Science and Technology
    • /
    • v.29 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • It is believed that traditional Korean medicines can be managed more scientifically through the development of logical criteria to verify their region of cultivation, and that this could contribute to the advancement of the traditional herbal medicine industry. This study attempted to determine such criteria for Sansuyu. The volatile compounds were obtained from 20 samples of domestic Corni fructus (Sansuyu) and 45 samples of Chinese Sansuyu by steam distillation. The metabolites were identified in the NIST Mass Spectral Library via the obtained gas chromatography/mass spectrometer (GC/MS) data of 53 training samples. Data binning at 0.2 min intervals was performed to normalize the number of variables used in the statistical analysis. Multivariate statistical analyses, such as principle component analysis (PCA), partial least squares-discriminant analysis (PLS-DA), and orthogonal partial least squares-discriminant analysis (OPLS-DA) were performed using the SIMCA-P software package. Significant variables with a variable importance in the projection (VIP) score higher than 1.0 were obtained from OPLS-DA, and variables that resulted in a p-value of less than 0.05 through one-way ANOVA were selected to verify the marker compounds. Finally, among the 11 variables extracted, 1-ethylbutyl-hydroperoxide (9.089 min), nonadecane (20.170 min), butylated hydroxytoluene (25.319 min), 5β,7βH,10α-eudesm-11-en-1α-ol (25.921 min), 7,9-bis(2-methyl-2-propanyl)-1-oxaspiro[4.5]deca-6,9-diene-2,8-dione (34.257 min), and 2-decyldodecyl-benzene (54.717 min) were selected as markers to indicate the origin of Sansuyu. The statistical model developed was suitable for the determination of the geographical origin of Sansuyu. The cultivation areas of four Korean and eight Chinese Sansuyu samples were predicted via the established OPLS-DA model, and it was confirmed that 11 of the 12 samples were accurately classified.

Design and Implementation of A Distributed Information Integration System based on Metadata Registry (메타데이터 레지스트리 기반의 분산 정보 통합 시스템 설계 및 구현)

  • Kim, Jong-Hwan;Park, Hea-Sook;Moon, Chang-Joo;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.233-246
    • /
    • 2003
  • The mediator-based system integrates heterogeneous information systems with the flexible manner. But it does not give much attention on the query optimization issues, especially for the query reusing. The other thing is that it does not use standardized metadata for schema matching. To improve this two issues, we propose mediator-based Distributed Information Integration System (DIIS) which uses query caching regarding performance and uses ISO/IEC 11179 metadata registry in terms of standardization. The DIIS is designed to provide decision-making support, which logically integrates the distributed heterogeneous business information systems based on the Web environment. We designed the system in the aspect of three-layer expression formula architecture using the layered pattern to improve the system reusability and to facilitate the system maintenance. The functionality and flow of core components of three-layer architecture are expressed in terms of process line diagrams and assembly line diagrams of Eriksson Penker Extension Model (EPEM), a methodology of an extension of UML. For the implementation, Supply Chain Management (SCM) domain is used. And we used the Web-based environment for user interface. The DIIS supports functions of query caching and query reusability through Query Function Manager (QFM) and Query Function Repository (QFR) such that it enhances the query processing speed and query reusability by caching the frequently used queries and optimizing the query cost. The DIIS solves the diverse heterogeneity problems by mapping MetaData Registry (MDR) based on ISO/IEC 11179 and Schema Repository (SCR).

Optimization of Municipal Pavement Management System(PMS) Components (Development of a Prototype PMS for Ansan City) (시도로 포장관리체계(PMS) 구성요소 최적화 연구 (안산시 Prototype PMS 개발사례))

  • Park, Sang-Kyu;Suh, Young-Chan
    • International Journal of Highway Engineering
    • /
    • v.2 no.4 s.6
    • /
    • pp.111-122
    • /
    • 2000
  • PMS(Pavement Management System) has been developed and/or operated for the freeway and national highway systems in Korea. There is, however, no municipal PMS that is necessary in many cities for efficient management of their roadways. In this study, a municipal Prototype PMS is developed. The Prototype PMS is designed to be operated on PC base. It uses GIS interface for user friendliness that applies color graphics, text and distress pictures to display pavement conditions and rehabilitation information for both current and historical situations. The computer program of the prototype PMS consists of four major functions(inquiry, analysis, data management, and print). Especially, prioritization and M&R(Maintenance and Rehabilitation) alternative selection procedure is designed to be flexible so that the users can modify the decision criteria whenever it is necessary. Database items of the Prototype PMS is carefully selected for the objectives and size of municipal PMS. Reference point method is basically used for the location referencing in the Database. The unit section consists of each loom segment of the road for effective management.

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

A Study on the Development of Product Design Database Based on Product Attributes (제품속성을 기반으로 한 제품디자인 데이터베이스 개발에 대한 기초적 연구)

  • 박정순;이건표
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.133-144
    • /
    • 1999
  • Considering product as mass of information, it is very critical for designers to have good means of accessing to and organizing information on products. However, designers conventionally depend on their experience, bunch of catalogues, or short visit to some fairs for gathering information on products. There are no systematically organized information for designing new products. If any, those are ones developed by market researchers or engineers who speak fundamentally different language from designers. It is needed to develop the information system through which designer can get insights on the essence of product and communicate information with various persons involved in new product planning. At first, the design information in product planning is discussed and the necessity of development of new design information system is emphasized. Then, product is understood as a composite of various attributes and a set of fundamental attributes of product is defined by surveying and summarizing existing theories of product attributes: namely technological, human, and market attributes. The possibility of new design information system is explored by analyzing various relationships between attributes of different products. Computer program 'DISPP' displays various visual information of product itself, perceptual map, trend slope, profile chart and general information of manufacturer, style, color, price, size. Finally, findings of thesis are concluded and further prospects of the study are proposed.

  • PDF

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF