• Title/Summary/Keyword: 동적 탐지

Search Result 298, Processing Time 0.022 seconds

Realtime 3D Stereoscopic Image based on Single Camera with Marker Recognition (마커 인식을 이용한 싱글카메라 기반의 실시간 3D 입체영상)

  • Hyun, Hye-Jung;Park, Jun-Hyoung;Ko, Il-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.92-101
    • /
    • 2011
  • However, in order to create a stereoscopic 3D image, independently, it is required to spend expensive manufacturing costs and to have special techniques. As 3D display devices have been generalized, there is an increasing need for implementing a stereoscopic 3D image without a burden of expensive costs. This paper proposes some methods to implement stereoscopic 3D images easily by utilizing a marker tracking technology using a single camera. In addition, the study made it possible for the resolution of an image to be adjustable dynamically. This paper will be committed to the promotion of the field of UCC (User Created Contents) using stereoscopic 3D images by attracting the active participation of general users in the field of the implementation of stereoscopic 3D images.

Analysis on Static Characteristics for Greylist-based SPIT Level Decision of VoIP SPAM Calls (VoIP 스팸 Call의 Grey List 기반 SPIT 레벨 결정을 위한 정적 속성 분석 연구*)

  • Chang, Eun-Shil;Kim, Hyoug-Jong;Kang, Seung-Seok;Cho, Young-Duk;Kim, Myuhng-Joo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.109-120
    • /
    • 2007
  • VoIP service provides various functions that PSTN phone service hasn't been able to provide. Since it also has superiority in service charge, the number of user is increasing these days. When we think of the other side in cost aspect, the spam caller can also send his/her commercial message over phone line using more economic way. This paper presents the characteristics that should be considered to detect the spam call using greylisting method. We have explored static and dynamic characteristics in VoIP calls, and analyzed the relation among them. Especially, we have surveyed the authentication and charging method of Korean VoIP service provider. We have analyzed each charging method using our spam call simulation result, and derived the charging method that can be favored by spam caller. The contribution of the work is in analysis result of static aspect for SPIT Level calculation in greylisting method.

  • PDF

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Dynamic Calibration Coefficients Estimation with Linear Interpolation for Uncooled TEC-less IRFPA (비냉각형 TEC-less 열상 시스템에 적합한 선형보간 기반 동적 보정 계수 추정 기법)

  • Han, Sang-Hyuck;Kwak, Dong-Min
    • Aerospace Engineering and Technology
    • /
    • v.11 no.1
    • /
    • pp.98-102
    • /
    • 2012
  • These days, Uncooled IR Systems are more popular in the area of defense and aerospace than before. Uncooled IR Systems are widely used as core technology for making unmanned systems and detecting enemy objects during the day and night in the distance. Recently, researches on TEC-less IRFPA have been increased to minimize the power consumption and to make a smaller system than before. For this, it needs to find adequate NUC(Non-Uniformity Correction) coefficients as FPA(Focal Plane Array) temperature changes. In this paper, we propose a new NUC coefficient estimating technique, DCCE-LI(Dynamic Calibration Coefficients Estimation with Linear Interpolation), for TEC-less IRFPA. It is based on a linear interpolation method and it can estimate NUC coefficients in real-time. So, by testing and evaluating it with some IR images, we conclude that the quality of IR images using proposed method is better than applying static coefficients.

A Micro Mobility Management Scheme in Wireless LAN Environments (무선 LAN환경에서 마이크로 이동성 지원 방안)

  • 고광신;차우석;김형준;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.158-170
    • /
    • 2004
  • Mobile IP is a base protocol to support host mobility in IP-based wireless network. It is well known that the protocol contains two main delay factors on a handoff process; one is to detect a host movement, and the other is to register the host's current location to its home network. This paper examines Layer 2(L2) handoff procedure in the IEEE 802.11 Wireless LAN, and identifies these L2 triggers that can be usefully applied to Layer 3(L3) handoff. Then, the MCAA(Multiple-Casting using Anchor Agent) mechanism is proposed. It makes use of the L2 trigger and the network topology to construct an anchor agent dynamically, and the multiple-casting scheme to prevent an ongoing packet to be lost. Using a network simulator, the proposed mechanism has been evaluated the handoff delay and the packet lost point of view, in comparison with the regional registration protocol which is the most well known micro mobility support mechanism.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Real-Time Object Tracking Algorithm based on Adaptive Color Model in Surveillance Networks (서베일런스 네트워크에서 적응적 색상 모델을 기초로 한 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.183-189
    • /
    • 2015
  • In this paper, we propose an object tracking method using the color information of the image in surveillance network. This method perform a object detection using of adaptive color model. Object contour detection plays an important role in application such as object recognition. Experimental results demonstrate successful object detection over a wide range of object's variation in color and scale. In applications to detect an object in real time, when transmitting a large amount of image data it is possible to find the mode of a color distribution. The specific color of an object is modified at dynamically changing color in image. So, this algorithm detects the tracking area information of object within relevant tracking area and only tracking the movement of that object.Through experiments, we show that proposed method is more robust than other methods under certain ideal situations.

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.

Design and Measurement of Active Phased Array Radar Digital Receiver (능동 위상 배열 레이더의 디지털 수신기 제작 및 측정)

  • Kim, Tae-Hwan;Lee, Sung-Ju;Lee, Dong-Hwi;Hong, Yun-Seok;Cho, Choon-Sik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.371-379
    • /
    • 2011
  • Active phased array antenna structure is used for modern multi-function radars. To search targets in high clutter environment, the radar receiver needs high dynamic range performance. Though active phased array antenna structure lead to increase of SNR, the SFDR is not increased. In this paper, high SFDR receiver of X-band active phased array radar was designed and manufactured. One channel digital receiver is connected to 32 T/R modules and one PCB assembly is composed to 2 channel digital receivers with RF part, ADC part, LO distribution part and digital down conversion part. A commercial FIFO board was used for digital receiver measurement about major performance in digital output signal condition. The measured digital receiver gain and SFDR is 33 dB and more than 81 dBc each.