• Title/Summary/Keyword: database security

Search Result 643, Processing Time 0.026 seconds

Generation of ISAR Image for Realistic Target Model Using General Purpose EM Simulators (범용 전자기파 시뮬레이터를 이용한 사실적 표적 모델에 대한 역합성 개구면 레이다 영상 합성)

  • Kim, Seok;Nikitin, Konstantin;Ka, Min-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.2
    • /
    • pp.189-195
    • /
    • 2015
  • There are many research works on the SAR image generation using EM(Electro Magnetic) simulation. Particularly, there are several dedicated S/Ws for SAR image generation and analysis. But, most of them are not available to the public due to the reason for defense and security. In this paper, we describe the generation of ISAR images for a realistic target model using the general purpose EM simulator like FEKO. This method can benefit us many advantages like building the database of many targets for target recognition with cost-and-time effective way.

Investigation on the Scrum-based Standard Management for Efficient Data Quality Control of Small-sized Companies : A Case Study on Distribution Service of Company 'I' (중소기업의 효율적 데이터 품질관리를 위한 스크럼 기반 표준관리 방안 : 'I'사 물류서비스 적용 사례)

  • Kim, Tai-Yun;Kim, Nam-Gyu;Sohn, Yong-Lak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.83-105
    • /
    • 2010
  • The competence of enterprise for managing information is evaluated not by the amount of information but by the quality of information such as response time, data consistency, and data correctness. The degradation of data quality is usually caused by the inappropriate process of managing the structure and value of stored data. According to the recent survey on the actual condition of data quality management, the correctness and consistency of data appeared to be the most problematic area among the six criteria of data quality management such as correctness, consistency, availability, timeliness, accessibility, and security. Moreover, the problem was more serious in case of small and medium-sized companies than large enterprises. In this paper, therefore, we attempt to propose a new data quality control methodology for small and medium-sized companies that can improve the correctness and consistency of data without consuming too much time and cost. To adopt the proposed methodology to real application immediately, we provided some scripts for as-is analysis and devised automation tools for managing naming rules of vocabulary, terminology, and data code. Additionally, we performed case study on the distribution service of a small-sized company to estimate the applicability of our tool and methodology.

  • PDF

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

Detecting Faces on Still Images using Sub-block Processing (서브블록 프로세싱을 이용한 정지영상에서의 얼굴 검출 기법)

  • Yoo Chae-Gon
    • The KIPS Transactions:PartB
    • /
    • v.13B no.4 s.107
    • /
    • pp.417-420
    • /
    • 2006
  • Detection of faces on still color images with arbitrary backgrounds is attempted in this paper. The newly proposed method is invariant to arbitrary background, number of faces, scale, orientation, skin color, and illumination through the steps of color clustering, cluster scanning, sub-block processing, face area detection, and face verification. The sub-block method makes the proposed method invariant to the size and the number of faces in the image. The proposed method does not need any pre-training steps or a preliminary face database. The proposed method may be applied to areas such as security control, video and photo indexing, and other automatic computer vision-related fields.

A Secure Face Cryptogr aphy for Identity Document Based on Distance Measures

  • Arshad, Nasim;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1156-1162
    • /
    • 2013
  • Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which generates a unique secure cryptographic key from a face template. The face images are processed to produce face templates or codes to be utilized for the encryption and decryption tasks. The result identity data is encrypted using Advanced Encryption Standard (AES). Distance metric naming hamming distance and Euclidean distance are used for template matching identification process, where template matching is a process used in pattern recognition. The proposed system is tested on the ORL, YALEs, and PKNU face databases, which contain 360, 135, and 54 training images respectively. We employ Principle Component Analysis (PCA) to determine the most discriminating features among face images. The experimental results showed that the proposed distance measure was one the promising best measures with respect to different characteristics of the biometric systems. Using the proposed method we needed to extract fewer images in order to achieve 100% cumulative recognition than using any other tested distance measure.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-An;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.225-234
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics. system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Face Recognition using Extended Center-Symmetric Pattern and 2D-PCA (Extended Center-Symmetric Pattern과 2D-PCA를 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.111-119
    • /
    • 2013
  • Face recognition has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous applications, such as access control, surveillance, security, credit-card verification, and criminal identification. In this paper, we propose a simple descriptor called an ECSP(Extended Center-Symmetric Pattern) for illumination-robust face recognition. The ECSP operator encodes the texture information of a local face region by emphasizing diagonal components of a previous CS-LBP(Center-Symmetric Local Binary Pattern). Here, the diagonal components are emphasized because facial textures along the diagonal direction contain much more information than those of other directions. The facial texture information of the ECSP operator is then used as the input image of an image covariance-based feature extraction algorithm such as 2D-PCA(Two-Dimensional Principal Component Analysis). Performance evaluation of the proposed approach was carried out using various binary pattern operators and recognition algorithms on the Yale B database. The experimental results demonstrated that the proposed approach achieved better recognition accuracy than other approaches, and we confirmed that the proposed approach is effective against illumination variation.

Cervical Cancer Trends in Mexico: Incidence, Mortality and Research Output

  • Anaya-Ruiz, Maricruz;Vincent, Ana Karen;Perez-Santos, Martin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.20
    • /
    • pp.8689-8692
    • /
    • 2014
  • Purpose: To evaluate the recent incidence and mortality of and scientific research trends in cervical cancer in Mexican females. Materials and Methods: Data between 2000 and 2010 from the Department of Epidemiology of the Ministry of Health, and International Agency for Research on Cancer (IARC) of World Health Organization were analyzed, and age-standardized rates (ASRs) were calculated. In addition, scientific research data were retrieved from the Web of Science database from 2003 to 2012, using different terms related to cervical cancer. Results: The incidence rate decreased during last five years, while mortality rates showed an annual decrease of 4.93%. A total of 780 articles were retrieved, and the institutions with the majority of publications were National Autonomous University of Mexico (34.87%), Social Security Mexican Institute (16.02%), and National Institute of Cancerology (15%). The main types of research were treatment, diagnosis, and prevention. Conclusions: The above results show that incidence of cervical cancer decreased over time in Mexico during last five years; similarly, the downturn observed in mortality mainly reflects improved survival as a result of earlier diagnosis and cancer treatment. Also, this article demonstrates the usefulness of bibliometrics to address key evaluation questions and to establish priorities, define future areas of research, and develop cervical cancer control strategies in Mexico.

Mexican Breast Cancer Research Output, 2003-2012

  • Perez-Santos, Jose Luis Martin;Anaya-Ruiz, Maricruz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.10
    • /
    • pp.5921-5923
    • /
    • 2013
  • The objetive of this study was to explore a bibliometric approach to quantitatively assess current research trends with regard to breast cancer in Mexico. Articles were analyzed by scientific output and research performances of individuals, institutes, and collaborative countries with Mexico. Data were retrieved from the Web of Science database from 2003 to 2012; this was searched using different terms related to breast cancer, including "breast cancer", "mammary ductal carcinoma" and "breast tumour". Data were then extracted from each file, transferred to Excel charts and visualised as diagrams. A total of 256 articles were retrieved. The institutions with the majority of publications were the National Autonomous University of Mexico (22.3%), the National Institute of Cancerology (21.9%), and Social Security Mexican Institute (20.3%); clinical observation studies were the dominant investigation type (64%), and the main types of research were metabolics (24.2%) and pathology (21.5%). This article demonstrates the usefulness of bibliometrics to address key evaluation questions and to establish priorities, define future areas of research, and develop breast cancer control strategies in Mexico.

Purchase Satisfaction of Apparel for Internet Fashion Shopping Mall Users - focused on 20's~30's Men and Women (인터넷 패션 쇼핑몰 이용자의 의류구매 만족도 -20~30대 남녀를 중심으로-)

  • 신수연;김민정
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.4
    • /
    • pp.487-499
    • /
    • 2003
  • The purpose of this study was to suggest marketing strategies to internet fashion shopping malls identifying factors that customers consider important. Data were collected by survey questionnaire and the subjects were 322 men and women in their twenties and thirties living in Seoul and Kyung-gi. SPSS 10.0 package were used and reliability, frequency, cross tabulation, chi-square, paired t-test, ANOV A and Duncan test were conducted for data analysis. The results were as follows. I) Subjects placed the most importance on providing the precise and detail information of products but its satisfaction level was low. 2) Subjects considered the ‘low price’ very importantly but its satisfaction level of it was not high. 3) Subject's importance and satisfaction level of ‘point system’ were about an average. 'Point system' has to be activated by using systems such as 'point network system' by pointbanking co. as one of price-cutting strategies. 4) Internet fashion shopping mall users treated 'the security system of personal data' importantly while they were not sufficiently satisfied with the system. 5) Female placed more importance on design and color of products and suppliance of the trendy items.

  • PDF