• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.034 seconds

Moving Object Classification through Fusion of Shape and Motion Information (형상 정보와 모션 정보 융합을 통한 움직이는 물체 인식)

  • Kim Jung-Ho;Ko Han-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.38-47
    • /
    • 2006
  • Conventional classification method uses a single classifier based on shape or motion feature. However this method exhibits a weakness if naively used since the classification performance is highly sensitive to the accuracy of moving region to be detected. The detection accuracy, in turn, depends on the condition of the image background. In this paper, we propose to resolve the drawback and thus strengthen the classification reliability by employing a Bayesian decision fusion and by optimally combining the decisions of three classifiers. The first classifier is based on shape information obtained from Fourier descriptors while the second is based on the shape information obtained from image gradients. The third classifier uses motion information. Our experimental results on the classification Performance of human and vehicle with a static camera in various directions confirm a significant improvement and indicate the superiority of the proposed decision fusion method compared to the conventional Majority Voting and Weight Average Score approaches.

Rotated Video Detection using Multi Region Binary Patterns (이중 영역 이진 패턴을 이용한 회전된 비디오 검출)

  • Kim, Semin;Lee, Seungho;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.9
    • /
    • pp.1070-1075
    • /
    • 2014
  • Due to a number of illegal copied videos, many video content markets have been threatened. Since this copied videos have intercepted the profits of the content holders, content developers lose the will to generate new contents. Therefore, video copy detection approaches have been developed to protect the copyrights of video contents. However, many illegal uploader who generate copied videos used video transformations to avoid video copy detection systems. Among of the video transformations, rotation and flipping did not distorted the quality of video contents. Thus, these two video transformations were adopt to generate copied video. In order to detect rotated or flipping copy videos, rotation and flipping robust region binary pattern (RFR) recently was proposed. But, this RFR has a weakness according to rotated angles. Therefore, in order to overcome this problem, multi region binary patterns are proposed in this paper. The proposed method has the similar performance with the original RFR. But, it showed much higher efficiency for memory spaces.

A Self-Adaptive Agorithm for Optimizing Random Early Detection(RED) Dynamics (라우터 버퍼 관리 기반 체증 제어 방식의 최적화를 위한 자체 적응 알고리즘)

  • Hong, Seok-Won;Yu, Yeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3097-3107
    • /
    • 1999
  • Recently many studies have been done on the Random Early Detection(RED) algorithm as an active queue management and congestion avoidance scheme in the Internet. In this paper we first overview the characteristics of RED and the modified RED algorithms in order to understand the current status of these studies. Then we analyze the RED dynamics by investigating how RED parameters affect router queue behavior. We show the cases when RED fails since it cannot react to queue state changes aggressively due to the deterministic use of its parameters. Based on the RED parameter analysis, we propose a self-adaptive algorithm to cope with this RED weakness. In this algorithm we make two parameters be adjusted themselves depending on the queue states. One parameter is the maximum probability to drop or mark the packet at the congestion state. This parameter can be adjusted to react the long burst of traffic, consequently reducing the congestion disaster. The other parameter is the queue weight which is also adjusted aggressively in order for the average queue size to catch up with the current queue size when the queue moves from the congestion state to the stable state.

  • PDF

A Study on DDoS Attack Mitigation Technique in MANET (MANET 환경에서 DDoS 공격 완화 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.3-8
    • /
    • 2012
  • MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

3D Feature Based Tracking using SVM

  • Kim, Se-Hoon;Choi, Seung-Joon;Kim, Sung-Jin;Won, Sang-Chul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1458-1463
    • /
    • 2004
  • Tracking is one of the most important pre-required task for many application such as human-computer interaction through gesture and face recognition, motion analysis, visual servoing, augment reality, industrial assembly and robot obstacle avoidance. Recently, 3D information of object is required in realtime for many aforementioned applications. 3D tracking is difficult problem to solve because during the image formation process of the camera, explicit 3D information about objects in the scene is lost. Recently, many vision system use stereo camera especially for 3D tracking. The 3D feature based tracking(3DFBT) which is on of the 3D tracking system using stereo vision have many advantage compare to other tracking methods. If we assumed the correspondence problem which is one of the subproblem of 3DFBT is solved, the accuracy of tracking depends on the accuracy of camera calibration. However, The existing calibration method based on accurate camera model so that modelling error and weakness to lens distortion are embedded. Therefore, this thesis proposes 3D feature based tracking method using SVM which is used to solve reconstruction problem.

  • PDF

An Implementation and Effectiveness Analysis of Web Based Training System for the Subjects of Computer Education in Educational University (교육대학교 컴퓨터교육 교과에서의 웹기반 훈련 시스템의 구축과 효율성 분석)

  • Han, Kyu-Jung
    • Journal of The Korean Association of Information Education
    • /
    • v.7 no.1
    • /
    • pp.91-101
    • /
    • 2003
  • The advantages of Web Based Training(WBT) are flexible delivery of training, easy distribution, security through registration and ease of content update. And WBT also provide a powerful instructional environment. An obvious instructional advantage of WBT is the ability to provide for the delivery rich multimedia to learners. In this paper, we have proposed the curricula for the Subjects of Computer Education in University. And We implemented the Web Based Training System for the Subjects of Computer Education including the proposed curricula. The Proposed system are composed of student's learning part, lecture's teaching part, and operator's management part. And we show the Effectiveness and Weakness of proposed system, based on the students answering about various questions related proposed system's effectiveness.

  • PDF

The SWOT-AHP Framework for the Enterprise Cloud Computing Strategy (기업의 클라우드 컴퓨팅 전략수립을 위한 SWOT-AHP 프레임워크 개발)

  • Tang, Nguyen Hanh;Shao, Jing;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.22 no.2
    • /
    • pp.85-104
    • /
    • 2013
  • 최근 클라우드 컴퓨팅이 학계나 실무계에서 많은 주목을 받고 있으며, 공공기관에서도 클라우드 컴퓨팅을 도입하고 있는 추세에 있다. 클라우드 컴퓨팅은 장 단점을 모두 가지고 있지만 지속적으로 발전하고 있으며, 기업들은 클라우드 기반의 정보시스템을 도입하기 위한 다양한 솔루션들을 활용하고 있다. 따라서 기업에서 클라우드 컴퓨팅 도입을 위해 고려해야 할 요소들은 무엇이며, 어떻게 계획을 수립할 것인지는 시급한 과제라고 할 수 있다. 본 논문의 목적은 기업이 클라우드 컴퓨팅 채택 전략을 수립하기 위한 프레임 워크를 제시하는 것이다. 구체적으로, SWOT-AHP는 클라우드 컴퓨팅을 실행하는 과정에서 강점-약점-기회-위협 요인을 파악하고, 전략 계획을 보다 효율적으로 수립 하는데 사용된다. 경영전략 이론에서 널리 알려져 있는 SWOT과 다기준의사결정기법 중 실무에서 가장 활발하게 사용되고 있는 AHP는 복잡하지 않고 적용이 쉽기 때문에 본 연구에서 제안하는 방법을 이용한다면 실무에서도 큰 어려움 없이 SWOT-AHP 프레임워크를 클라우드 컴퓨팅 전략수립에 적용할 수 있을 것으로 기대한다.

An Efficient Methodology for Daily Waste Treatment Using Reverse Logistics Network: Focused on D Metropolitan City (역물류네트워크를 이용한 생활폐기물 처리 효율화 방안 - D광역시를 중심으로)

  • Yun, YoungSu;Chen, Xing
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.2
    • /
    • pp.97-111
    • /
    • 2015
  • In this paper, a methodology for effectively treating daily waste at D metropolitan city is considered using reverse logistics(RL) network. Currently, eight district offices at D metropolitan city are treating their daily wastes using each RL network. However, unfortunately, current method has a weakness such as inefficiency of RL network operation. Therefore, we propose a revised method for improving the inefficiency. In case study, we compare the performances of the current and revised methods using various real-life data. The analysis result shows that the revised method outperforms the current method.

A Study on Attack against NTRU Signature Implementation and Its Countermeasure (NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구)

  • Jang, Hocheol;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.551-561
    • /
    • 2018
  • As the computational technology using quantum computing has been developed, several threats on cryptographic systems are recently increasing. Therefore, many researches on post-quantum cryptosystems which can withstand the analysis attacks using quantum computers are actively underway. Nevertheless, the lattice-based NTRU system, one of the post-quantum cryptosystems, is pointed out that it may be vulnerable to the fault injection attack which uses the weakness of implementation of NTRU. In this paper, we investigate the fault injection attacks and their previous countermeasures on the NTRU signature system and propose a secure and efficient countermeasure to defeat it. As a simulation result, the proposed countermeasure has high fault detection ratio and low implementation costs.