• Title/Summary/Keyword: CloudCompare

Search Result 135, Processing Time 0.028 seconds

Wireless Communication Quality Improvement Through DSES Alarmed Noise Image Restoration

  • Ki-Hwan, Kim;HyunHo, Kim;HoonJae, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.55-62
    • /
    • 2023
  • Radio waves must pass through the unstable atmosphere for successful wireless data transmission from space to ground stations. Data link algorithms required by the International Space Data Systems Advisory Committee (CCSDS) must be capable of detecting and resynchronizing cryptographic and receiver-side errors. However, error recovery is not part of the CCSDS requirements. This paper proposes an algorithm that enables robustness and error recovery against various noises. We experimented with environments such as Gaussian, Salt, Pepper, and S&P noise through noise reduction filters, filters that improve sharpness, and EDSR. In addition, we compare similar algorithms SES Alarmed and DSES Alarmed.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

DISTANCE MEASUREMENT IN THE AEC/FM INDUSTRY: AN OVERVIEW OF TECHNOLOGIES

  • Jasmine Hines;Abbas Rashidi;Ioannis Brilakis
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.616-623
    • /
    • 2013
  • One of the oldest, most common engineering problems is measuring the dimensions of different objects and the distances between locations. In AEC/FM, related uses vary from large-scale applications such as measuring distances between cities to small-scale applications such as measuring the depth of a crack or the width of a welded joint. Within the last few years, advances in applying new technologies have prompted the development of new measuring devices such as ultrasound and laser-based measurers. Because of wide varieties in type, associated costs, and levels of accuracy, the selection of an optimal measuring technology is challenging for construction engineers and facility managers. To tackle this issue, we present an overview of various measuring technologies adopted by experts in the area of AEC/FM. As the next step, to evaluate the performance of these technologies, we select one indoor and one outdoor case and measure several dimensions using six categories of technologies: tapes, total stations, laser measurers, ultrasound devices, laser scanners, and image-based technologies. Then we evaluate the results according to various metrics such as accuracy, ease of use, operation time, associated costs, compare these results, and recommend optimal technologies for specific applications. The results also revealed that in most applications, computer vision-based technologies outperform traditional devices in terms of ease of use, associated costs, and accuracy.

  • PDF

Effect of extraction method on quality characteristics of the carrot juice (주스착즙 방식에 따른 당근 주스의 품질 특성 변화)

  • Park, Hye-Jung;Kim, Ji-Youn;Lee, Song Min;Kim, Hee Sook;Lee, Sang-Hyeon;Lee, Mun Hyon;Jang, Jeong Su
    • Korean Journal of Food Science and Technology
    • /
    • v.51 no.4
    • /
    • pp.369-378
    • /
    • 2019
  • This study aimed to compare the quality characteristics of carrot juice based on different extraction methods such as centrifugation, single gear, and twin gear methods. Juice quality was evaluated based on extraction yield, nutritional components, and cloud stability. Twin gear extraction resulted in the highest extraction yield, and the highest mineral content. In addtion, ${\beta}$-carotene level higher than the recommended daily intake was obtained only in the carrot juice prepared using twin gear extraction of 100 g carrots. The minimum particle size was observed in twin gear extraction, followed by single gear extraction and centrifugation method. Therefore, twin gear extraction was selected as the optimal method, and changes in the antioxidant and metabolic activity of carrot juice were investigated using this method. Consequently, the carrot juice showed a higher lipid peroxidation inhibition rate than ${\alpha}$-tocopherol (1 mg/mL), and angiotensin I-converting enzyme (ACE) inhibitory activity was increased upon digestion.

Soil Moisture Estimation Using KOMPSAT-3 and KOMPSAT-5 SAR Images and Its Validation: A Case Study of Western Area in Jeju Island (KOMPSAT-3와 KOMPSAT-5 SAR 영상을 이용한 토양수분 산정과 결과 검증: 제주 서부지역 사례 연구)

  • Jihyun Lee;Hayoung Lee;Kwangseob Kim;Kiwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1185-1193
    • /
    • 2023
  • The increasing interest in soil moisture data from satellite imagery for applications in hydrology, meteorology, and agriculture has led to the development of methods to produce variable-resolution soil moisture maps. Research on accurate soil moisture estimation using satellite imagery is essential for remote sensing applications. The purpose of this study is to generate a soil moisture estimation map for a test area using KOMPSAT-3/3A and KOMPSAT-5 SAR imagery and to quantitatively compare the results with soil moisture data from the Soil Moisture Active Passive (SMAP) mission provided by NASA, with a focus on accuracy validation. In addition, the Korean Environmental Geographic Information Service (EGIS) land cover map was used to determine soil moisture, especially in agricultural and forested regions. The selected test area for this study is the western part of Jeju, South Korea, where input data were available for the soil moisture estimation algorithm based on the Water Cloud Model (WCM). Synthetic Aperture Radar (SAR) imagery from KOMPSAT-5 HV and Sentinel-1 VV were used for soil moisture estimation, while vegetation indices were calculated from the surface reflectance of KOMPSAT-3 imagery. Comparison of the derived soil moisture results with SMAP (L-3) and SMAP (L-4) data by differencing showed a mean difference of 4.13±3.60 p% and 14.24±2.10 p%, respectively, indicating a level of agreement. This research suggests the potential for producing highly accurate and precise soil moisture maps using future South Korean satellite imagery and publicly available data sources, as demonstrated in this study.

Multiple Outbursts of a Short-Periodic Comet 15P/Finlay

  • Ishiguro, Masateru;Kuroda, Daisuke;Kim, Yoonyoung;Kwon, Yuna;Hanayama, Hidekazu;Miyaji, Takeshi;Honda, Satoshi;Takahashi, Jun;Watanabe, Jun-Ichi
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.61.2-61.2
    • /
    • 2015
  • 15P/Finlay is one of the Jupiter-Family Comets that has long been known since the late 19 century. The comet maintains the perihelion around 1.0 AU over a century, without showing any prominent activities (i.e. fragmentation or eruption) since the discovery. According to reports in unpublished observations, the comet exhibited an outburst in the middle of 2014 December. We conducted a imaging observation of 15P/Finlay just after the report, from 2014 December 23 to 2015 February 18 using three telescopes (the Okayama Astrophysical Observatory 50-cm telescope, the Ishigakijima Astronomical Observatory 105-cm telescope, and the Nishi-Harima Astronomical Observatory 2-m telescope), which constitute a portion of the OISTER (an inter-university observation network in the optical and infrared wavelengths). As a result of the frequent observations, we witnesses the second outburst around UT 2015 January 16. Such cometary outbursts draw the attention to researchers on ground that they could offer insight into the internal structure of comets, following a historical outburst occurred at 17P/Holmes on 2007 October 23. Although cometary outbursts have been often reported mostly in unpublished observations or unreviewed reports, it should be emphasized that there are not a sufficient number of astrophysical research which characterizes the physical properties by observing the aftermaths. This presentation provides a new observational result of 15P/Finlay outburst. Based on the morphological development of the dust cloud as well as the near-nuclear magnitude, we will derive the kinetic energy of the outburst. Finally we plan to compare the results of 15P/Finlay with those of analogical events at 17P/Holmes and P/2010 V1 (Ikeya-Murakami).

  • PDF

The Characteristics of Chinese Traditionality Expression in View of Spatial Elements at Restaurants in Beijing Area (베이징지역 레스토랑 공간구성요소에 나타난 중국 전통성 표현 특성 연구)

  • Yuan, DanDan;Oh, Hye Kyung
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.1
    • /
    • pp.163-171
    • /
    • 2016
  • The objectives of this study is to analyze the characteristics of Chinese traditionality expression at restaurants in Beijing area. 12 restaurants were selected and visited for the investigation research. The results were as follows. First, traditional reproduction was found mainly manifested through the reproduction of traditional ornaments, in particular, the facade and interior element ornaments. Second, Traditional transformation was mainly manifested in replacement material while changing the shape slightly, or to stretch or shorten prototype shape and other negative deformation methods which did not largely out of the scope of traditional reproduction. Third, Traditional reinterpretation was expressed by abstract, symbol or metaphor on designs, usually people can not directly recognize the traditional archetype. When compare with traditional reproduction or traditional transformation, traditional reinterpretation was relatively fewer, however, in this study the traditional reinterpretation and traditional transformation have same numerical result. Reinterpretation as a positive performance method of traditional modernized, it was encouraging the phenomenon, especially in the ceiling design. Chinese traditional cloud patterns have been three-dimensional and diversification of use. And in the wall design, traditional elements have been extremely simplistic or adopted a wide variety of traditional elements, it may be preferred in diversity. In addition, furniture was tinge traditional elements in modern form, lighting was added symbolize color or picture on the traditional lighting which shape was simplified to emphasize space's traditional. But the facade, sign board, floor, and window element seems the range of variation was not wild, promote more use the positive traditional reinterpretation method.