• Title/Summary/Keyword: Security Objects

Search Result 372, Processing Time 0.023 seconds

Off-axis self-reference digital holography in the visible and far-infrared region

  • Bianco, Vittorio;Paturzo, Melania;Finizio, Andrea;Ferraro, Pietro
    • ETRI Journal
    • /
    • v.41 no.1
    • /
    • pp.84-92
    • /
    • 2019
  • Recent advances in digital holography in the far-infrared region of the spectrum have demonstrated the potential use of digital holography in homeland security as a tool to observe hostile environments in which smoke, flames, and dust impair vision. However, to make this application practical, it is necessary to simplify the optical setup. Here, we show an off-axis, self-reference scheme that spills the reference beam out from the object beam itself and avoids the need for a complex interferometric arrangement. We demonstrate that this scheme allows the reconstruction of high-quality holograms of objects captured under visible as well as far-infrared light exposure. This could pave the way to the industrialization of holographic systems to enable users to see through fire. Moreover, the quantitative nature of the holographic signal is preserved. Thus, the reported results demonstrate the possibility to use this setup for optical metrology.

Detection of Malicious PDF based on Document Structure Features and Stream Objects

  • Kang, Ah Reum;Jeong, Young-Seob;Kim, Se Lyeong;Kim, Jonghyun;Woo, Jiyoung;Choi, Sunoh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.85-93
    • /
    • 2018
  • In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document structure and the JavaScript contained in the stream object In addition, when JavaScript is inserted, keywords with high occurrence frequency in malicious code such as function name, reserved word and the readable string in the script are extracted. Then, we generate a machine learning model that can distinguish between normal and malicious. In order to make it difficult to bypass, we try to achieve good performance in a black box type algorithm. For an experiment, a large amount of documents compared to previous studies is analyzed. Experimental results show 98.9% detection rate from three different type algorithms. SVM, which is a black box type algorithm and makes obfuscation difficult, shows much higher performance than in previous studies.

A Secure Database Model based on Schema using Partition and Integration of Objects (객체의 분할과 통합에 의한 스키마 기반 데이타베이스 보안 모델)

  • Kang, Seog-Jun;Kim, Yoeng-Won;Hwang, Chong-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.51-64
    • /
    • 1995
  • In distributed environments, the DB secure models have been being studied to include the multi-level mechanism which is effective to control access according to the level of the data value. These mechanisms have the problems. The first, it is impossible to maintain the global data which is protected in the multi-level mechanism. The second, the access and the relation of the data is not clear due to the access revocation between the local data and the global's. In this paper, we proposed the mechanism using shema. The mechanism doesn't have the access revocation, and provides the protection of the data and the control to the global data.

Multicore Processor based Parallel SVM for Video Surveillance System (비디오 감시 시스템을 위한 멀티코어 프로세서 기반의 병렬 SVM)

  • Kim, Hee-Gon;Lee, Sung-Ju;Chung, Yong-Wha;Park, Dai-Hee;Lee, Han-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.161-169
    • /
    • 2011
  • Recent intelligent video surveillance system asks for development of more advanced technology for analysis and recognition of video data. Especially, machine learning algorithm such as Support Vector Machine (SVM) is used in order to recognize objects in video. Because SVM training demands massive amount of computation, parallel processing technique is necessary to reduce the execution time effectively. In this paper, we propose a parallel processing method of SVM training with a multi-core processor. The results of parallel SVM on a 4-core processor show that our proposed method can reduce the execution time of the sequential training by a factor of 2.5.

The Windows Physical Memory Dump Explorer for Live Forensics (라이브 포렌식을 위한 윈도우즈 물리 메모리 분석 도구)

  • Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 2011
  • Live data in physical memory can be acquired by live forensics but not by harddisk file-system analysis. Therefore, in case of forensic investigation, live forensics is widely used these days. But, existing live forensic methods, that use command line tools in live system, have many weaknesses; for instance, it is not easy to re-analyze and results can be modified by malicious code. For these reasons, in this paper we explain the Windows kernel architecture and how to analyze physical memory dump files to complement weaknesses of traditional live forensics. And then, we design and implement the Physical Memory Dump Explorer, and prove the effectiveness of our tool through test results.

Application Of Probability Filter For Maintenance Of Air Objects

  • Piskunov, Stanislav;Iasechko, Maksym;Yukhno, leksandr;Polstiana, Nadiia;Gnusov, Yurii;Bashynskyi, Kyrylo;Kozyr, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.31-34
    • /
    • 2021
  • The article considers the possibilities of increasing the accuracy of estimates of the parameters of the trajectory of the target with the provision of a given probability of stable support of the air object, in particular, during its maneuver. The aim of the work is to develop a filtration algorithm that provides a given probability of stable tracking of the air object by determining the regular components of filtration errors, in particular, when maneuvering the air object, and their compensation with appropriate correction of filter parameters and estimates of air object trajectory parameters.

UML Modeling to TM Modeling and Back

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.84-96
    • /
    • 2021
  • Certainly, the success of the Unified Modeling Language (UML) as the de facto standard for modeling software systems does not imply closing the door on scientific exploration or experimentation with modeling in the field. Continuing studies in this area can produce theoretical results that strengthen UML as the leading modeling language. Recently, a new modeling technique has been proposed called thinging machine (TM) modeling. This paper utilizes TM to further understand UML, with two objectives: (a) Fine issues in UML are studied, including theoretical notions such as events, objects, actions, activities, etc. Specifically, TM can be used to solve problems related to internal cross-diagram integration. (b) TM applies a different method of conceptualization, including building a model on one-category ontology in contrast to the object-oriented paradigm. The long-term objective of this study is to explore the possibility of TM complementing certain aspects in the UML methodology to develop and design software systems. Accordingly, we alternate between UML and TM modeling. A sample UML model is redesigned in TM, and then UML diagrams are extracted from TM. The results clarify many notions in both models. Particularly, the TM behavioral specification seems to be applicable in UML.

PR Technology As A Modern Function Of Educational Management

  • Kovalenko, Yelena;Kovalchuk, Olena;Hotsalyuk, Аlla;Karikov, Sergiy;Havrylo, Olena;Kotlyar, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.399-405
    • /
    • 2022
  • This article is devoted to the consideration of the image strategies of higher education on the example of a comparison of Ukrainian and foreign experience. The relevance of the chosen topic is as follows. Today, educational institutions need to position, shape and elevate their image. PR helps to solve all these tasks, performing a function that is so necessary for establishing mutual understanding as communication management. The following tasks are solved in the article: originality of definitions was investigated; revealed PR and related concepts; analyzed the role of PR in the information promotion of universities; determined the specifics of information promotion, due to temporary conditions and regional development; considered image materials of Ukrainian and foreign universities; disclosed the specifics of the information promotion of the objects under study; analyzed.

An End-to-End Sequence Learning Approach for Text Extraction and Recognition from Scene Image

  • Lalitha, G.;Lavanya, B.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.220-228
    • /
    • 2022
  • Image always carry useful information, detecting a text from scene images is imperative. The proposed work's purpose is to recognize scene text image, example boarding image kept on highways. Scene text detection on highways boarding's plays a vital role in road safety measures. At initial stage applying preprocessing techniques to the image is to sharpen and improve the features exist in the image. Likely, morphological operator were applied on images to remove the close gaps exists between objects. Here we proposed a two phase algorithm for extracting and recognizing text from scene images. In phase I text from scenery image is extracted by applying various image preprocessing techniques like blurring, erosion, tophat followed by applying thresholding, morphological gradient and by fixing kernel sizes, then canny edge detector is applied to detect the text contained in the scene images. In phase II text from scenery image recognized using MSER (Maximally Stable Extremal Region) and OCR; Proposed work aimed to detect the text contained in the scenery images from popular dataset repositories SVT, ICDAR 2003, MSRA-TD 500; these images were captured at various illumination and angles. Proposed algorithm produces higher accuracy in minimal execution time compared with state-of-the-art methodologies.

Communication with Video Games as a Process of Semiosis

  • Maletska, Mariia;Ostashchuk, Ivan;Khrypko, Svitlana;Salo, Hanna;Petryshyn, Halyna;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.37-42
    • /
    • 2022
  • Communication as a process of interpreting signs has always existed in people's life. In post-information society, the communication between a person and a technological system through the specific sign-attaching process becomes widespread. Moreover, it somehow replaces usual communication between people. One of the means of communication in the digital space are video games. They not only play an important role in communication processes, but also are a special case of sign-creating and interpreting. The purpose of the article is to examine video games as a space of sign-based communication between a person and a game as a specific digital system. With the help of general scientific and hermeneutic methodology, the analysis of video games as a post-information society phenomenon which people communicate to has been conducted. The process of semiosis as attaching special meanings to signs has been traced in both manipulating in-game objects and characters and understanding rules of an in-game world.