• Title/Summary/Keyword: Real-time Tracking

Search Result 1,533, Processing Time 0.028 seconds

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Object Recognition Face Detection With 3D Imaging Parameters A Research on Measurement Technology (3D영상 객체인식을 통한 얼굴검출 파라미터 측정기술에 대한 연구)

  • Choi, Byung-Kwan;Moon, Nam-Mee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.53-62
    • /
    • 2011
  • In this paper, high-tech IT Convergence, to the development of complex technology, special technology, video object recognition technology was considered only as a smart - phone technology with the development of personal portable terminal has been developed crossroads. Technology-based detection of 3D face recognition technology that recognizes objects detected through the intelligent video recognition technology has been evolving technologies based on image recognition, face detection technology with through the development speed is booming. In this paper, based on human face recognition technology to detect the object recognition image processing technology is applied through the face recognition technology applied to the IP camera is the party of the mouth, and allowed the ability to identify and apply the human face recognition, measurement techniques applied research is suggested. Study plan: 1) face model based face tracking technology was developed and applied 2) algorithm developed by PC-based measurement of human perception through the CPU load in the face value of their basic parameters can be tracked, and 3) bilateral distance and the angle of gaze can be tracked in real time, proved effective.

Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events

  • Ashok Kumar, P.M.;Vaidehi, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.169-189
    • /
    • 2015
  • Detection of anomalous events from video streams is a challenging problem in many video surveillance applications. One such application that has received significant attention from the computer vision community is traffic video surveillance. In this paper, a Lossy Count based Sequential Temporal Pattern mining approach (LC-STP) is proposed for detecting spatio-temporal abnormal events (such as a traffic violation at junction) from sequences of video streams. The proposed approach relies mainly on spatial abstractions of each object, mining frequent temporal patterns in a sequence of video frames to form a regular temporal pattern. In order to detect each object in every frame, the input video is first pre-processed by applying Gaussian Mixture Models. After the detection of foreground objects, the tracking is carried out using block motion estimation by the three-step search method. The primitive events of the object are represented by assigning spatial and temporal symbols corresponding to their location and time information. These primitive events are analyzed to form a temporal pattern in a sequence of video frames, representing temporal relation between various object's primitive events. This is repeated for each window of sequences, and the support for temporal sequence is obtained based on LC-STP to discover regular patterns of normal events. Events deviating from these patterns are identified as anomalies. Unlike the traditional frequent item set mining methods, the proposed method generates maximal frequent patterns without candidate generation. Furthermore, experimental results show that the proposed method performs well and can detect video anomalies in real traffic video data.

The Development of HILS and Test Equipment for Millimeter-Wave (Ka-Band) Seeker's Test and Evaluation (밀리미터파 탐색기 시험 평가를 위한 HILS 및 시험 장비 개발)

  • Song, Sung-Chan;Na, Young-Jin;Yoon, Tae-Hwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.47-55
    • /
    • 2012
  • This paper describes the developed HILS and test equipment in order to test the performances of MMW(Millimeter-Wave) seeker which can detect and track a high speed of short-range ballistic missile and aircraft. This system is used to 141 horn antenna array, array switching, and gain and phase control algorithm to simulate various kind of targets and trajectory of high speed and maneuver moving target. In addition, it simulates not only velocity and range for these targets but also clutter and jamming environments. System configuration and implementation and the measurement results of major subsystems such as target motion simulator, simulation signal generator, high speed data aquisition unit, and central control unit are presented. These systems could verify the detection and tracking performance of MMW seeker through dynamic real-time test based on simulation flight scenario.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

An Automated Technique for Detecting Axon Structure in Time-Lapse Neural Image Sequence (시간 경과 신경계 영상 시퀀스에서의 축삭돌기 추출 기법)

  • Kim, Nak Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.251-258
    • /
    • 2014
  • The purpose of the neural image analysis is to trace the velocities and the directions of moving mitochondria migrating through axons. This paper proposes an automated technique for detecting axon structure. Previously, the detection process has been carried out using a partially automated technique combined with some human intervention. In our algorithm, a consolidated image is built by taking the maximum intensity value on the all image frames at each pixel Axon detection is performed through vessel enhancement filtering followed by a peak detection procedure. In order to remove errors contained in ridge points, a filtering process is devised using a local reliability measure. Experiments have been performed using real neural image sequences and ground truth data extracted manually. It has been turned out that the proposed algorithm results in high detection rate and precision.

Improvement of Steady State Response Using PI+Double Integral Controller (비례적분+이중적분 제어기를 이용한 정상상태 응답 개선)

  • Jung, Gyu Hong
    • Journal of Drive and Control
    • /
    • v.13 no.3
    • /
    • pp.24-31
    • /
    • 2016
  • The performance characteristics of a dynamic control system are evaluated according to the transient and steady-state responses. The transient performance is the controllability of the output for the tracking of the reference or the ability to reduce or reject the effects of unwanted disturbances; alternatively, the steady-state performance is represented by the magnitude of the control error at the steady state. As the effects of the two performances on each other are reciprocal, a controller design that shows a zero steady-state error for the ramp input is uncommon because of the challenge regarding the achievement of an acceptable transient response. This paper proposes a PI+double-integral controller for the elimination of the steady-state error for the ramp input while a sound transient performance is maintained. The control-gain design procedure is described by the second-order response for the step input and the response of the error dynamics for the ramp input. The PI+double-integral controller is designed for the first-order transfer function that is derived from a system identification with the open-loop experiment data of the dc-motor. The simple structure of the proposed controller enables the adoption of a low-end microcontroller for the implementation of a real-time control. The experiment results show that the control performance is as effective as that of the simulation analysis for the operating point of linear system; furthermore, the PI+double-integral controller can be conveniently applied to the control system, which is desirable for the improvement of the steady-state error.

Feasibility Study of Robotics-based Patient Immobilization Device for Real-time Motion Compensation

  • Chung, Hyekyun;Cho, Seungryong;Cho, Byungchul
    • Progress in Medical Physics
    • /
    • v.27 no.3
    • /
    • pp.117-124
    • /
    • 2016
  • Intrafractional motion of patients, such as respiratory motion during radiation treatment, is an important issue in image-guided radiotherapy. The accuracy of the radiation treatment decreases as the motion range increases. We developed a control system for a robotic patient immobilization system that enables to reduce the range of tumor motion by compensating the tumor motion. Fusion technology, combining robotics and mechatronics, was developed and applied in this study. First, a small-sized prototype was established for use with an industrial miniature robot. The patient immobilization system consisted of an optical tracking system, a robotic couch, a robot controller, and a control program for managing the system components. A multi speed and position control mechanism with three degrees of freedom was designed. The parameters for operating the control system, such as the coordinate transformation parameters and calibration parameters, were measured and evaluated for a prototype device. After developing the control system using the prototype device, a feasibility test on a full-scale patient immobilization system was performed, using a large industrial robot and couch. The performances of both the prototype device and the realistic device were evaluated using a respiratory motion phantom, for several patterns of respiratory motion. For all patterns of motion, the root mean squared error of the corresponding detected motion trajectories were reduced by more than 40%. The proposed system improves the accuracy of the radiation dose delivered to the target and reduces the unwanted irradiation of normal tissue.

Design and Implementation of Robot-Based Alarm System of Emergency Situation Due to Falling of The Eldely (고령자 낙상에 의한 응급 상황의 4족 로봇 기반 알리미 시스템 설계 및 구현)

  • Park, ChulHo;Lim, DongHa;Kim, Nam Ho;Yu, YunSeop
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.781-788
    • /
    • 2013
  • In this paper, we introduce a quadruped robot-based alarm system for monitoring the emergency situation due to falling in the elderly. Quadruped robot includes the FPGA Board(Field Programmable Gate Array) applying a red-color tracking algorithm. To detect a falling of the elderly, a sensor node is worn on chest and accelerations and angular velocities measured by the sensor node are transferred to quadruped robot, and then the emergency signal is transmitted to manager if a fall is detected. Manager controls the robot and then he judges the situation by monitoring the real-time images transmitted from the robot. If emergency situation is decided by the manager, he calls 119. When the fall detection system using only sensor nodes is used, sensitivity of 100% and specificity of 98.98% were measured. Using the combination of the fall detection system and portable camera (robot), the emergency situation was detected to 100 %.

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.