• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.028 seconds

The Performance Improvement of Edge Histogram Descriptor Image Matching using Image Normalization (이미지 정규화를 이용한 Edge Histogram Descriptor 이미지 매칭 성능 개선)

  • Jo, Min-Hyuk;Lee, Sang-Geol;Cho, Jae-Hyun;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.385-388
    • /
    • 2013
  • In this paper, we show the weakness of the image matching method by using MPEG-7 EHD(Edge Histogram Descriptor) and suggest how to improve this weakness by using image normalization. EHD algorithm is an image matching technique that collects edge's slope of distribution and same distribution. However, the EHD error rate is high because EHD is sensitive for changes of object distortion and rotation that will be matched. We improve matching performance by accurately extract edge information in image by using normalization. We compare and analyze the normalized EHD algorithm by using distortion and rotation and it shows robustness for changes of the size and rotation.

  • PDF

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.457-461
    • /
    • 2017
  • Barcode is widely being used in many places such as supermarket, cafeteria, library, etc. ISBN, Code 128, Code 39 are mainly used in barcode. Among them, Code 128 which is based on ASCII Code can transfer control letters that range from ASCII Code 0 to ASCII 32. Control letters intrinsically imply letters that are used to deliver information to peripheral devices such as a printer or communication joint, however, they play quite different roles if they are inputted on Windows. Generally, barcode devices doesn't verify input data, thus it enables people to tag any barcode that has specific control letters and execute the commands. Besides, most barcode recognition programs are using a database and they have more security weakness compared to other programs. On the basis of those reasons, I give an opinion that SQL Injection can attack barcode recognition programs through this study.

  • PDF

Cryptanalysis of a Remote User Authentication scheme using Smart Cards (스마트카드를 이용한 원격 사용자 인증 스킴의 안전성 분석)

  • Shin, Seung-Soo;Han, Kun-Hee;Chun, Je-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5245-5251
    • /
    • 2011
  • Seo et al. criticizes that Hu-Niu-Yang's certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users. However, Seo et al. also has a weakness not satisfying the security requirements. This paper suggests a new scheme that contains the characteristics of certification scheme provided by Seo et al. but compensates weak points. The findings show that the new scheme is more safety and efficient than Seo et al.'s

An Evaluation of Real-Time Navigational Safety with Weather Conditions (함정의 기상 변화에 다른 실시간 항해 안전성 평가)

  • 공길영
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.1
    • /
    • pp.169-177
    • /
    • 1999
  • There is some limitations for ship to gather weather and sea state information. To make up for this weakness, land organizations can gather the wider variety of information, evaluate the navigational safety on a ship, and supply this information to the ship. In this study, the involuntary speed loss are calculated using the real-time information on weather and considering the increase of resistance induced by wave, and the navigational safety in a seaway is evaluated. The used model for computer simulation is Lpp 93m frigate class ship. The feasibility study is made of using simulation results in actual operation.

  • PDF

The Effect of Internal Control Weaknesses on Book-Tax Difference (내부회계관리제도의 취약점이 회계이익과 과세소득의 차이에 미치는 영향)

  • Yu, Soon-Mi;Park, Sang-Bong
    • Management & Information Systems Review
    • /
    • v.30 no.3
    • /
    • pp.169-190
    • /
    • 2011
  • Recent academic studies have investigated book-tax differences as an indicator of earnings management. Tax accounting texts claim that the differences between pre-tax financial reporting earnings and taxable income can provide information about current earnings, and the large differences between book and taxable incomes are an indicator of low-quality financial reporting earnings. This study investigates the effect of internal control system over book and tax difference using the KOSPI and KOSDAQ firms from 2006 to 2008. The empirical findings are consistent with a weakness of internal control system being associated with higher book-tax difference. That means a firm which has material weakness in the internal control system allows for more malpractice. In addition to this, If the managers tries to the efficient tax decrease strategy, book-tax difference can be large. Which in turn leads us to observe a positive relation between the weakness of internal control system and intensity of book-tax difference. Overall, we interpret this evidence as indicating that the failure of the internal control system can effect not only investors and creditors but also tax authorities. And It emphasizes that a more effective internal control system linked with sound corporate governance.

  • PDF

Han-ok Construction Simulation based on Environmental Analysis (환경분석기반 한옥 시공 시뮬레이션에 관한 연구)

  • Kim, Mi-Kyoung;Jun, Han-Jong
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.4
    • /
    • pp.292-299
    • /
    • 2011
  • Han-ok has a long history and cultural traditions. It has green and healthy and culture but high construction costs, thermal insulation performance of residential and vulnerable to fires and have a weakness for maintenance. However, modernized resident housing, Han-ok is required to improve in terms of environmental aspect due to its weakness for insulating and inconvenience for modem era. Also Han-Ok's building is criticized as a huge dependence on subjective building experiences. This is pointed to be the biggest problem, Han-ok has. Traditionally it does not have a scientific and specific manual for construction. In this research, process simulation was adopted to develop Han-Ok's environmental improvements. In terms of LCC (Life Cycle Cost) aspect, however, Han-Ok's environmental characteristics are examined to suggest an appropriate Han-Ok construction method. Also the result of this research would be utilized to base the information database for efficient constructing and its management in new Han-Ok constructing industry.

Motion Recognition using Principal Component Analysis

  • Kwon, Yong-Man;Kim, Jong-Min
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.4
    • /
    • pp.817-823
    • /
    • 2004
  • This paper describes a three dimensional motion recognition algorithm and a system which adopts the algorithm for non-contact human-computer interaction. From sequence of stereos images, five feature regions are extracted with simple color segmentation algorithm and then those are used for three dimensional locus calculation precess. However, the result is not so stable, noisy, that we introduce principal component analysis method to get more robust motion recognition results. This method can overcome the weakness of conventional algorithms since it directly uses three dimensional information motion recognition.

  • PDF

Deriving Smart City Elements Considering for the Disabled with Information - For the Elderly - (정보약자를 고려한 스마트시티 구성요소 도출 - 고령자를 대상으로 -)

  • Park, Hyun Joon;Kim, Jong Gu;Shin, Eun Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.4
    • /
    • pp.541-549
    • /
    • 2019
  • Recently, Korea has been attracting the attention of smart city as a solution to urban problems along with the era of Forth Industrial Revolution. However, tourism, industry, and specific high-class residential complexes are being formed, and the disabled with information such as the elderly and disabled who can actually get help are not experienced. This study establishes the concept of smart city suitable for domestic and derives the priority of physical and non-physical elements of smart city considering information weakness. Smart City considering disabled with information has concluded that not only physical elements but also non-physical components are important, and derive the differences between the experts and the priorities of actual information weak people. We will propose a smart city development direction that takes into account information weak people that can be developed and advanced in response to the needs of information weak people.

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

A Debate on Regulatory Framework for Online Dispute Resolution (ODR 관련 규정체제에 관한 논의)

  • Kim, Sun-Kwang
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.277-295
    • /
    • 2007
  • This paper presents the ODR phenomenon with a specific focus on regulatory problems. It argues that the current regulatory framework for online dispute resolution is, to a large extent, defective. Existing deficiencies result not only from a lack of comprehensive ODR law, but also from the weakness of the other modalities of regulation : norms and market. The current today's approach to regulating ODR has been unsuccessful, and it is time to re-examine that position. I would like to say that suggesting details of the optimal ODR regulatory framework is beyond the scope of this paper. From a broader perspective, the field of ODR seems to be not sufficiently regulated. Neither by law, nor by the restrains set by other norms or market. Given the current weakness of the modalities of regulation, online dispute resolution requires greater institutional and international support. It appears that adoption of internationally harmonized ODR law would not hamper the development of norms and market, but rather support their proper growth. As a result, the co-regulation approach recommended in this paper is different from both traditional state-oriented models of regulation and self-regulatory systems. Arguably, this co-regulation approach is the optimal model for regulation of online dispute resolution under current circumstances.

  • PDF