• Title/Summary/Keyword: 이동보안

Search Result 1,315, Processing Time 0.026 seconds

Active Object Tracking System based on Stereo Vision (스테레오 비젼 기반의 능동형 물체 추적 시스템)

  • Ko, Jung-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.159-166
    • /
    • 2016
  • In this paper, an active object tracking system basing on the pan/tilt-embedded stereo camera system is suggested and implemented. In the proposed system, once the face area of a target is detected from the input stereo image by using a YCbCr color model and phase-type correlation scheme and then, using this data as well as the geometric information of the tracking system, the distance and 3D information of the target are effectively extracted in real-time. Basing on these extracted data the pan/tilted-embedded stereo camera system is adaptively controlled and as a result, the proposed system can track the target adaptively under the various circumstance of the target. From some experiments using 480 frames of the test input stereo image, it is analyzed that a standard variation between the measured and computed the estimated target's height and an error ratio between the measured and computed 3D coordinate values of the target is also kept to be very low value of 1.03 and 1.18% on average, respectively. From these good experimental results a possibility of implementing a new real-time intelligent stereo target tracking and surveillance system using the proposed scheme is finally suggested.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Analysis of Deformation and Stability of Slope at the Wiri Region of Local Road 999 Nearby Andong, Gyeongsangbukdo in Korea. (999번 지방도로 경상북도 안동시 위리 지역의 사면 변형 및 안정성 분석)

  • 장현식;장보안
    • The Journal of Engineering Geology
    • /
    • v.10 no.1
    • /
    • pp.1-12
    • /
    • 2000
  • Heaving of road and subsidence of slope took place at the Wiri region of the local highway 999 in Gyeongsangbukdo, Korea after heavy rain in the next year of construction. Although the state government had performed remedial treatments by reducing the angle and the height of the slope, deformation had never stopped. Therefore, we have preformed the analysis of deformation and stabilityof the slope. Study area consists of the Cretaceous shale, siltstone and sandstone and two faults are found. The major deformation occurred by sliding of rock mass along faults after heavy rain because not only thepore pressure at the fault plane and the unit weight of sliding mass increased, but did the shearstrength of saturated fault clay become very low. The decrease in shear strength of saturated fault clayis the major factor among the reasons for deformation. Numerical simulations using limit equilibriummodel, finite difference model and finite element model were performed for eight cross sections.Although safety factors are above 1.7 during the dry season, they become below 1.0 when groundwaterlevel raises to surface. The maximum displacement is about 15-3Ocm. However, safety factors increasedto above 2.4 and the maximum displacement is below 2.08cm after remedial treatment, Indicating thatthe slope becomes stable.

  • PDF

Risk Analysis for Cut Slope using Probabilistic Index of Landslide (사면파괴 가능성 지수를 이용한 절취사면 위험도 분석)

  • Jang, Hyun-Shic;Oh, Chan-Sung;Jang, Bo-An
    • The Journal of Engineering Geology
    • /
    • v.17 no.2 s.52
    • /
    • pp.163-176
    • /
    • 2007
  • Landslides which is one of the major natural hazard is defined as a mass movement of weathered material rock and debris due to gravity and can be triggered by complex mechanism. It causes enormous property damages and losses of human lift directly and indirectly. In order to mitigate landslide risk effectively, a new method is required to develope for better understanding of landslide risk based on the damaged cost produce, investment priority data, etc. In this study, we suggest a new evaluation method for slope stability using risk analysis. 30 slopes including 10 stable slopes, 10 slopes of possible failure and 10 failed slopes along the national and local roads are examined. Risk analysis comprises the hazard analysis and the consequence analysis. Risk scores evaluated by risk analysis show very clear boundaries for each category and are the highest for the failed slopes and the lowest for the stable slopes. The evaluation method for slope stability suggested by this research may define the condition and stability of slope more clearly than other methods suggested by others.

A Study on Enhancing VMS Services by FM Car Radio (차량 내 FM라디오를 이용한 VMS서비스 개선 연구)

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.22-32
    • /
    • 2010
  • Increasingly advanced Information Technology (IT) has changed the operator so as to create more diversified and advanced traffic information demand. To deal with the changing demand in private sector, a concept of on-demand traffic information has been rapidly introduced. However VMS, a product of the first generation of ITS, which was designed to provide the unspecified individuals during driving the car with the basic level of traffic information by the public failed to actively change itself in such a changing pattern. This study was intended to describe the VMS system (tentatively, FM-VMS) which was further developed to accommodate the needs favoring the sophisticated PDA with the public role of providing the unspecified individuals with the equal information. FM-VMS introduced in this study is the device designed to transmit the voice and message to the drivers through the radio information device mounted on a car. A core technology is, unlike FM-DARC and RDS, the Water Making technology which directly inserts the digital signal into FM frequency in use. It's been currently used for broadcasting and security purpose. A detection rate as a result of testing FM-VMS system using Water Making technology was 90% or more in voice and message within 20m from test VMS. When a public-developed VMS information could be transmitted using FM frequency to the relatively vulnerable users (vulnerable to traffic information) in voice on a real-time basis to provide the regional traffic information, and furthermore, VMS message could be received through radio liquid using FM frequency only, it would obviously bring about the innovation in ITS as well as pave the way for creating the new added value down the road.

Emotional Labor and Human Rights Protection in the case of airlines (감정노동과 인권보호 - 항공사를 중심으로)

  • Shin, Dong Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.87-108
    • /
    • 2014
  • Recent examples of abuse by black consumers (including air travellers) against emotional laborers have become a serious social issue in Korea in that they are likely to violate human rights of those laborers. Emotional labor is a form of emotion regulation that creates a publicly visible facial and bodily display, and also emotional management within the workforce that creates a situation in which the emotion management by workers can be exchanged in the marketplace. Example professions that require emotional labor are: nurses, doctors, waiting staff, and television actors. However, as the economy moves from a manufacturing to a service-based economy, many more workers in a variety of occupational fields are expected to manage their emotions according to employer demands when compared to the past. One of symptoms deriving from emotional labor is smile mask syndrome abbreviated SMS, which is a psychological disorder proposed by professor Makoto Natsume where subjects develop depression and physical illness as a result of prolonged, unnatural smiling. And higher degree of using emotion regulation on the job is related to higher levels of employees' emotional exhaustion, and lower levels of employees' job satisfaction. In most part, emotional laborers are more abused and hurt by so called black consumers who are raising complaints relating to products and services purchased against service providers for the purpose of maliciously getting compensation. Against this background, the Korean Government abolished "the Consumer Protection Act" and instead promulgated "the Basic Consumer Act" in September 2006 which stipulates that consumers are expected to have protection as well as responsibility and duty. The Aviation Security Act cites the examples of prohibited behaviors (unruly passengers) while they are travelling. In addition, human rights of emotional laborers could be more protected by the enhancement of etiquettes and cavalry and improvement of culture and working environment.

A New Height Estimation Scheme Using Geometric Information of Stereo Camera based on Pan/tilt control (팬/틸트 제어기반의 스데레오 카메라의 기하학적 정보를 이용한 새로운 높이 추정기법)

  • Ko Jung-Hwan;Kim Eun-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.156-165
    • /
    • 2006
  • In this paper, a new intelligent moving target tracking and surveillance system basing on the pan/tilt-embedded stereo camera system is suggested and implemented. In the proposed system, once the face area of a target is detected from the input stereo image by using a YCbCr color model and phase-type correlation scheme and then, using this data as well as the geometric information of the tracking system, the distance and 3D information of the target are effectively extracted in real-time. Basing on these extracted data the pan/tilted-imbedded stereo camera system is adaptively controlled and as a result, the proposed system can track the target adaptively under the various circumstance of the target. From some experiments using 480 frames of the test input stereo image, it is analyzed that a standard variation between the measured and computed the estimated target's height and an error ratio between the measured and computed 3D coordinate values of the target is also kept to be very low value of 1.03 and 1.18$\%$ on average, respectively. From these good experimental results a possibility of implementing a new real-time intelligent stereo target tracking and surveillance system using the proposed scheme is finally suggested.

A Study on Test Report Information Service Architecture for Preventing Forgery and Alteration in Defense Industry (군수품 시험성적서 위·변조 방지 시스템 아키텍처에 대한 연구)

  • Lee, Donghun;Jeon, Sooyune;Bae, Manjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Preventing the forgery and alteration of test reports is important, in order to maintain the reliability of military supplies. Based on a survey of reports on testing institutions and a case study of established electronic document systems in the public sector, we propose a system architecture, which helps prevent the forgery and alteration of test reports with legal force. The proposed architecture takes advantage of both the time stamp that records the time a document is received and a server synchronized with the testing institution. Using the proposed system architecture, the user is able to request a test and receive reports from the testing institution without delay. Also, a defense agency is able to conveniently prove the authenticity of the test reports and utilize the statistical data collected by the architecture. Therefore, we expect that the proposed system architecture will help defense agencies to prevent the forgery and alteration of test reports and ensure their reliability and quality.

A Reliable Group Key Re-transmission Mechanism in Ad-hoc Environment (Ad-hoc 환경에서 신뢰적인 그룹 키 재전송 기법)

  • Hong, Suk-Hyung;Kim, Kyung-Min;Lee, Kwang-Kyum;Sin, Young-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.370-374
    • /
    • 2006
  • Ad-hoc 환경의 응용은 재난구조나 회의실 또는 강의실에서의 정보 교환과 같은 그룹 통에서 이용된다. Ad-hoc 환경은 무선 채널을 이용하므로 상대적인 낮은 대역폭과 높은 오류 발생률을 가지게 된다. 따라서 Ad-hoc 네트워크에서는 신뢰적인 전송이 요구된다. 이동 노드는 상대적으로 낮은 성능과 에너지의 제한으로 인해 유선 환경과 같은 신뢰적인 전송 기법을 Ad-hoc 환경에 적용하기에는 문제가 발생한다. Ad-hoc 환경의 무선 채널이 가지는 보안적인 취약성과 높은 에러율을 극복하는 신뢰적인 그룹 키 전송을 위한 재전송 기법을 제안한다. 신뢰적인 트리 형성하기 위해 n차 트리 구조를 이용한다. 손실 감지를 위한 ACK 메시지를 이용하고 손실 복구를 위한 재전송 기법에 대해 연구를 한다. 제안한 신뢰적인 그룹 키 전송을 위한 재전송 기법은 트리의 깊이의 차수가 루트 관리 노드, 서브 관리 노드와 로컬 멤버 노드로 구성되기 때문에 손실 감지와 손실 복구에 대한 연산의 오버헤드가 적다. 루트 관리 노드는 멤버 노드로부터 받은 개인키 정보를 이용하여 그룹 키를 생성하고 그룹 키 부분 정보를 서브 관리 노드에게 전송하고 서브 관리 노드에 대한 신뢰성을 책임진다. 서브 관리 노드는 루트 관리 노드로부터 받은 그룹 키 부분 정보를 로컬 멤버 노드에게 전송하고 로컬 멤버 노드에 대한 신뢰성을 책임진다. 루트 관리 노드와 서브 관리 노드를 관리 노드라 한다. 관리 노드가 신뢰적인 전송을 위해 관리하는 멤버 노드는 전체 그룹에 독립적으로 유지 가능하므로 확장성 및 효율성이 좋다. 관리 노드는 동적인 그룹에 따른 타이머를 설정함으로써 손실 감지에 대한 시간을 줄임으로써 효율적인 손실 감지 및 손실 복구를 한다. 임계값 설정으로 인한 중복 수신에 대한 오버헤드를 줄일 수 있다.신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선조체에서의 도파민 유리에 의한 수용체 결합능의 감소는 흡연에 의한 혈중 니코틴의 축

  • PDF

A Performance Improvement Scheme for a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터 성능 개선)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.415-426
    • /
    • 2005
  • Wireless internet, which becomes a hot social issue, has limitations due to the following characteristics, as different from wired internet. It has low bandwidth, frequent disconnection, low computing power, and small screen in user terminal. Also, it has technical issues to Improve in terms of user mobility, network protocol, security, and etc. Wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. In this paper, wireless internet proxy server clusters are used for the wireless Internet because their caching, distillation, and clustering functions are helpful to overcome the above limitations and needs. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the All-in-one structure which can be scalable in a systematic way but it also has disadvantages; 1) data sharing among cache servers is not allowed and 2) its communication structure among modules is complex. In this paper, we proposed its improved scheme which has an efficient communication structure among modules and allows data to be shared among cache servers. We performed experiments using 16 PCs and experimental results show 54.86$\%$ and 4.70$\%$ performance improvement of the proposed system compared to TranSend and All-in-one system respectively Due to data sharing amount cache servers, the proposed scheme has an advantage of keeping a fixed size of the total cache memory regardless of cache server numbers. On the contrary, in All-in-one, the total cache memory size increases proportional to the number of cache servers since each cache server should keep all cache data, respectively.