• Title/Summary/Keyword: 파일감시

Search Result 79, Processing Time 0.025 seconds

Development of Camera System Board Using ARM (ARM을 이용한 카메라 시스템 보드 개발에 관한 연구)

  • Choi, Young-Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.664-670
    • /
    • 2018
  • In modern society, CCTV, which is the eye of surveillance, is being used to collect image data in various ways in daily life. CCTV is used not only for security, surveillance, and crime prevention but also in many fields such as automobile and black box. In this paper, we have developed a STM32F407 ARM chip based camera system for various applications. In order to develop camera system, modeling of camera system based on 3D structure was carried out in SolidWorks environment. The PCB board design was developed to extract the PCB parts from the camera system modeling files into iges files, convert them from the Altium Designer tool into 3D and 2D boards, After designing the camera system circuit and PCB, we have been studying the implementation of the stable system by using TRM (Thermal Risk Management) tool to cope with the heat simulation generated on the board.

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

Study of Speed Profile for Dynamic Stability of EOTS (EOTS의 동적 안정성을 위한 속도 프로파일에 대한 연구)

  • Gyu-Chan Lee;Dong-Gi Kwag
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.919-925
    • /
    • 2023
  • Modern drones are equipped with miniaturized mission equipment capable of performing various tasks such as surveillance and reconnaissance. Consequently, these mission equipment are exposed to disturbances like wind loads and motor rotations, which can lead to instability in the operation of the Electro-Optical Targeting System (EOTS). Specifically, simple step inputs for changing the line of sight in EOTS can cause abrupt changes in speed, inducing overshoot and potentially creating instability along with other disturbances. To address this, a velocity profile was designed so that the angular velocity moves in a trapezoidal shape when changing the EOTS line of sight. A Double-loop controller was designed to apply this profile as an input to the external loop receiving position feedback. The system's stability was then compared, and the velocity profile was optimized within a stable range by varying maximum speed and acceleration.

Local Wind Field Simulation over Coastal Areas Using Windprofiler Data (윈드프로파일러 자료를 이용한 연안 지역 국지 바람장 모의)

  • Kim, Min-Seong;Kim, Kwang-Ho;Kim, Park-Sa;Kang, Dong-Hwan;Kwon, Byung Hyuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.2
    • /
    • pp.195-204
    • /
    • 2016
  • In this paper, the applicability and usefulness of windprofiler input data were investigated to generate three dimensional wind field. A logical diagnostic model CALMET with windprofiler data at ten sites and with weather forecasting model WRF output was evaluated by statistically comparing with the radiosonde data at eight sites. The horizontal wind speed from CALMET simulated with hourly windprofiler data is in good agreement with radiosonde observations within 1.5 m/s of the root mean square error, especially local circulation of wind such as sea breeze over the coastal region. The root mean square error of wind direction ranged $50^{\circ}{\sim}70^{\circ}$ is due to the wind direction error from the windprofiler polluted by ground clutters. Since the exact wind can be produced quickly and accurately in most of the altitude with windprofiler data on CALMET, we expect the method presented in this study to be useful for the monitoring of safe environment as well as weather in the coastal zone.

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

FADA: A fuzzy anomaly detection algorithm for MANETs (모바일 애드-혹 망을 위한 퍼지 비정상 행위 탐지 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.6
    • /
    • pp.1125-1136
    • /
    • 2010
  • Lately there exist increasing demands for online abnormality monitoring over trajectory stream, which are obtained from moving object tracking devices. This problem is challenging due to the requirement of high speed data processing within limited space cost. In this paper, we present a FADA (Fuzzy Anomaly Detection Algorithm) which constructs normal profile by computing mobility feature information from the GPS (Global Positioning System) logs of mobile devices in MANETs (Mobile Ad-hoc Networks), computes a fuzzy dissimilarity between the current mobility feature information of the mobile device and the mobility feature information in the normal profile, and detects effectively the anomaly behaviors of mobile devices on the basis of the computed fuzzy dissimilarity. The performance of proposed FADA is evaluated through simulation.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

Development of an EEG Software for Two-Channel Cerebral Function Monitoring System (2채널 뇌기능 감시 시스템을 위한 뇌파 소프트웨어의 개발)

  • Kim, Dong-Jun;Yu, Seon-Guk;Kim, Seon-Ho
    • Journal of Biomedical Engineering Research
    • /
    • v.20 no.1
    • /
    • pp.81-90
    • /
    • 1999
  • This paper describes an EEG(electroencephalogram) software for two-channel cerebral function monitoring system to detect the cerebral ischemia. In the software, two-channel bipolar analog EEG signals are digitized and from the signals various EEG parameters are extracted and displayed on a monitor in real-time. Digitized EEG signal is transformed by FFT(Fast Fourier transform) and represented as CSA(compressed spectral array) and DSA(density spectral array). Additional 5 parameters, such as alpha ratio, percent delta, spectral edge frequency, total power, and difference in total power, are estimated using the FFT spectra. All of these are effectively merged in a monitor and displayed in real-time. Through animal experiments and clinical trials on men, the software is modified and enhanced. Since the software provides raw EEG, CSA, DSA, simultaneously with additional 5 parameters in a monitor, it is possible to observe patients multilaterally. For easy comparison of patient's status, reference patterns of CSA, DSA can be captured and displayed on top of the monitor. And user can mark events of surgical operation and patient's conditions on the software, this allow him jump to the points of events directly, when reviewing the recorded EEG file afterwards. Other functions, such as forward/backward jump, gain control, file management are equipped and these are operated by simple mouse click. Clinical tests in a university hospital show that the software responds accurately according to the conditions of patients and medical doctors can use the software easily.

  • PDF

Implementation and Performance Analysis of a Multichannel Visual Monitoring System based on DirectX (DirectX 기반 다채널 영상 감시 시스템 구현 및 성능 분석)

  • Chung Sun-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.217-227
    • /
    • 2005
  • In this paper, we present the result of an efficient implementation of DirectX-based multichannel visual monitoring system and the performance analysis of it. Our proposed system mainly consists of three subsystems: display, storage, and retrieval/playback. The display subsystem is designed to utilize efficiently H/W acceleration, overlay and flip of DirectX for faster real-time display, display synchronization among channels, and improvement of tearing artifact. For the performance improvement of storage speed, the storage subsystem is designed and implemented in DirectShow Filter-based multithreading architecture so that it can store multichannel video streams efficiently in each channel with minimizing data bottleneck among channels. In the retrieval and playback subsystem, efficient index file architecture and video data storage architecture, efficient playback architecture which can make playback be processed parallel among channels are designed and implemented for faster retrieval and playback,. Through experiments, our proposed system is shown to be maximally 2 times as fast in storaging speed and maximally 3.5 times as fast in retrieval and playback speed as the previous system.

  • PDF