• Title/Summary/Keyword: 정보스캐닝

Search Result 291, Processing Time 0.024 seconds

Real-time multiple face recognition system based on one-shot panoramic scanning (원샷 파노라믹 스캐닝 기반 실시간 다수 얼굴 인식 시스템)

  • Kim, Daehwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.553-555
    • /
    • 2022
  • This paper is about a real-time automatic face recognition system based on one-shot panoramic scanning. It detects multiple faces in real time through a single panoramic scanning process and recognizes pre-registered faces. Instead of recognizing multiple faces within a single panoramic image, multiple faces are recognized using multiple images obtained in the scanning process. This reduces the panorama image creation time and stitching error, and at the same time can improve the face recognition performance by using the accumulated information of multiple images. It is expected that it can be used in various applications such as a multi-person smart attendance system with only a simple image acquisition device.

  • PDF

Smart Quality Inspection Scheme for Construction Project Using 3D Scanning Technology (3D스캐닝을 이용한 건설공사 스마트 품질점검 방안에 관한 연구)

  • Lee, Don-Soo;Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.2
    • /
    • pp.191-198
    • /
    • 2020
  • The several smart construction technologies are being introduced to the construction industry, and among these technologies, a few companies are attempting quality control using 3D scanning and BIM. Therefore, in this study, 3D scanning and BIM were applied to cases of on-site quality inspection to confirm the applicability and utility. As a result, it was confirmed that the quality inspection using 3D scanning and BIM was shorter in time than the previously performed quality inspection and can be realized with less manpower. Therefore, it is considered that 3D scanning and BIM-enabled technologies can be applied to various items of quality inspection.

A System to Diagnose Security Vulnerabilityes of System on Based Web (웹 기반에서 시스템 보안 취약점을 진단하는 시스템)

  • 서현진;강태호;이재영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.632-634
    • /
    • 2000
  • 최근에 일어나는 해킹 사고의 대부분은 스캐닝 도구를 사용하여 일차적으로 공격하고자 하는 시스템의 취약점 정보를 수집한 다음, 이를 바탕으로 시스템에 대해 공격을 시도하고 있다. 하지만, 대부분의 네트워크 시스템 관리자들은 자신의 시스템의 취약점에 대한 정보 부족과 기술 부족으로 인하여 무방비 상태로 관리하고 있는 실정이다. 그리고 대부분은 스캐닝 도구들은 처음에는 시스템 보안취약점 진단 목적으로 개발되었으나, 해커들에 의해 악용되고 있다. 따라서, 본 논문에서는 보안에 미숙한 관리자도 시스템의 취약점을 쉽게 발견하고 이를 바탕으로 하여 취약점을 보완할 수 있도록 웹 기반에서 시스템 보안 취약점을 진단하는 시스템을 제안하고자 한다.

  • PDF

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.

Neighbor List Management to enable Fast Scanning and Efficient Handover in IEEE 802.16e-Based Femto-cell Systems (IEEE 802.16e 기반의 펨토셀 시스템에서 빠른 스캐닝 및 효율적인 핸드오버를 위한 이웃 기지국 리스트 관리 기법)

  • Nam, Ji-Hee;Shin, Jung-Chae;Yoon, Cul-Sik;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.445-457
    • /
    • 2009
  • Recently, there are growing interests in femto-cell for providing indoor users with various broadband multimedia services more efficiently. The technical issues regarding femto-cell such as interference management, self-organization, and resource allocation are now being intensively studied and investigated by researchers worldwide. In this paper, two novel schemes of neighboring cell list(NCL) management are proposed for the IEEE 802.16e system where a macro-cell and huge number of femto-cells coexist. The proposed schemes, named MS location-based neighboring cell list management and BS type-based neighboring cell list management, enable a mobile station(MS) to perform fast scanning and efficient handover by means of preselecting the candidate target femto-cells with high possibility for handover. The simulation result shows that the proposed schemes improve the MS's handover-related performance in terms of scanning power and scanning time compared with the conventional managements scheme of IEEE 802.16e system.

Effective Point Dataset Removal for High-Speed 3D Scanning Processes (고속 3D 스캐닝 프로세스를 위한 효과적인 점데이터 제거)

  • Lim, Sukhyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1660-1665
    • /
    • 2022
  • Recently, many industries are using three dimensional scanning technology. As the performance of the 3D scanner gradually improves, a sampling step to reduce a point data or a remove step to remove a part determined to be noise are generally performed in post processing. However, total point data by long time scanning cannot be processed at once in spite of performing such those additional processes. In general, a method using a multi threaded environment is widely used, but as the scanning process work time increases, the processing performance gradually decreases due to various environmental conditions and accumulated operations. This paper proposes a method to initially remove point data judged to be unnecessary by calculating accumulated fast point feature histogram values from coming point data of the 3D scanner in real time. The entire 3D scanning process can be reduced using this approach.

A Study on the Extraction of Horizontal Alignment and Cross-Section of Roads using Mobile Laser Scanning Data (모바일 레이저 스캐닝 데이터를 이용한 도로선형 및 횡단면 추출에 관한 연구)

  • Kim, Se-Geun;Lee, Hyun-Yong;Joo, Young-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.207-218
    • /
    • 2006
  • The extraction of horizontal alignment and cross-section of roads is very important task in road safety diagnosis. Existing road safety diagnosis methods by investigators need much time and expense but don't provide various data. Therefor, we need road shape classification automatically and extraction method of horizontal alignment and cross-section of roads through digital photogrammetry system using GPS-VAN with laser scanner. In this paper, we propose a method of mobile laser scanning data acquisition, processing and developing extraction methods of horizontal alignment and cross-section of roads using mobile laser scanning data by GPS-VAN.

  • PDF

Scan Modeling and Performance Analysis for Extensive Terminal Information Identification (광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석)

  • Im, Sun-young;Shin, Seung-hun;Roh, Byeong-hee;Lee, Jung-tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.785-790
    • /
    • 2017
  • Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.

A Study on the Usefulness of Photogrammetry through 3D Recording of the Rock-carved Standing Buddha in Singyeong-ri, Hongseong (홍성 신경리 마애여래입상의 3차원 기록화를 통한 포토그래메트리의 유용성 연구)

  • Oh, Jun-Young;Kim, Choong-Sik
    • Korean Journal of Heritage: History & Science
    • /
    • v.50 no.3
    • /
    • pp.30-43
    • /
    • 2017
  • The purpose of this study is to improve the usefulness of photogrammetry in the field of cultural heritage recording concentrated on laser scanning. Two measurement methods(laser scanning, photogrammetry) were compared in terms of accuracy and reality for the Rock-carved Standing Buddha in Singyeong-ri, Hongseong. With regard to accuracy, the distances of major points by both shape information and between the two shape information were compared. Only a deviation of about 1mm was found in the distance measurement of the major points by both shape information. In particular, the average distance between two shape information identified through aligning was only about 0.01mm. Also, the absolute deviation within about 2mm accounted for 70% of the total, and the absolute deviation within about 3.5mm was found to be 95.4% of the total. These values showed very high similarity between laser scanning and photogrammetry-based shape information. In respect of reality, the carved depth, texture, and patterns were compared. As a result of comparing four cross-sectional shapes, only slight differences were found in the shape information of both measurement techniques and similar shapes were identified. The overall texture of both shape information was also similar. However, the detailed shape based on the photogrammetry with decimation is realized with a smoother texture than the original and laser scanning. In particular, Photogrammetry also realistically expressed the various ornaments carved in the Rock-carved Buddha and the patterns with shallow depths were comparatively detailed.

An Approach for Scanning Worm Detection using SVM (SVM을 사용한 스캐닝 웜 탐지에 관한 연구)

  • Kim, Dae-Gong;Moon, Jong-Sub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.82-84
    • /
    • 2005
  • 기존의 웜 탐지는 중요한 네트워크 소스의 폭주라 스위치 라우터 및 말단 시스템에서의 변동 효과를 가지고 공격을 판단했었다. 하지만 최근의 인터넷 웜은 발생 초기에 대응하지 못하면 그 피해의 규모가 기하급수적으로 늘어난다. 또한 방어하기가 어려운 서비스 거부 공격을 일으킬 수 있는 간접 공격의 주범이 될 수 있다는 정에서 웜의 탐지와 방어는 인터넷 보안에 있어서 매우 중요한 사안이 되었다. 본 논문에서는 이미 알려진 공격뿐 아니라 새로운 웜의 스캐닝 공격을 탐지하기 위하여, 패턴 분류 문제에 있어서 우수한 성능을 보이는 Support Vector Machine(SVM)[1]을 사용하여 인터넷 웜의 스캐닝 공격을 탐지하는 시스템 모델을 제안한다.

  • PDF