• Title/Summary/Keyword: multi-user detection

Search Result 111, Processing Time 0.028 seconds

LAB color illumination revisions for the improvement of non-proper image (비정규 영상의 개선을 위한 LAB 컬러조명보정)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.191-197
    • /
    • 2010
  • Many does an application and application but the image analysis of face detection considerably is difficult. In order for with effect of the illumination which is irregular in the present paper America the illumination to range evenly in the face which is detected, detects a face territory, Complemented the result which detects only the front face of existing. With LAB color illumination revisions compared in Adaboost face detection of existing and 32% was visible the face detection result which improves. Bought two images which are input and executed Glassfire label rings. Compared Area critical price and became the area of above critical value and revised from RGB smooth anger and LAB images with LCFD system algorithm. The operational conversion image which is extracted like this executed a face territory detection in the object. In order to extract the feature which is necessary to a face detection used AdaBoost algorithms. The face territory remote login with the face territory which tilts in the present paper, until Multi-view face territory detections was possible. Also relationship without high detection rate seems in direction of illumination, With only the public PC application is possible was given proof user authentication field etc.

An efficient ship detection method for KOMPSAT-5 synthetic aperture radar imagery based on adaptive filtering approach

  • Hwang, JeongIn;Kim, Daeseong;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.1
    • /
    • pp.89-95
    • /
    • 2017
  • Ship detection in synthetic aperture radar(SAR)imagery has long been an active research topic and has many applications. In this paper,we propose an efficient method for detecting ships from SAR imagery using filtering. This method exploits ship masking using a median filter that considers maximum ship sizes and detects ships from the reference image, to which a Non-Local means (NL-means) filter is applied for speckle de-noising and a differential image created from the difference between the reference image and the median filtered image. As the pixels of the ship in the SAR imagery have sufficiently higher values than the surrounding sea, the ship detection process is composed primarily of filtering based on this characteristic. The performance test for this method is validated using KOMPSAT-5 (Korea Multi-Purpose Satellite-5) SAR imagery. According to the accuracy assessment, the overall accuracy of the region that does not include land is 76.79%, and user accuracy is 71.31%. It is demonstrated that the proposed detection method is suitable to detect ships in SAR imagery and enables us to detect ships more easily and efficiently.

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.

Peak Detection of Pulse Wave Based on Fuzzy Inference and Multi Sub-Band Filters for U-Healthcare (U-헬스케어를 위한 퍼지추론과 다중 하위대역 필터를 기반한 맥파 최대치 검출)

  • Lee, Ju-Won;Lee, Byeong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2159-2164
    • /
    • 2008
  • Ubiquitous healthcare system is system that monitors and manages user's health information, and most important in the healthcare system is accuracy of the measured health data. But, the accuracy changes remarkably according to user's motion artifacts in real life. To elevate accuracy of health data, we proposed new algorithm to detect maximum point of pulse wave for heart rate extraction. and the proposed algorithm is to detect maximum points detect of pulse wave in photo-plethysmography signal included motion artifacts by fuzzy inference and multi sub-band filters. In results of experiment to evaluate the performance of the proposed algorithm, we could verify the proposed algorithm extracted maximum point of pulse wave in complex motion artifacts.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.

Performance evaluation of vessel extraction algorithm applied to Aortic root segmentation in CT Angiography (CT Angiography 영상에서 대동맥 추출을 위한 혈관 분할 알고리즘 성능 평가)

  • Kim, Tae-Hyong;Hwang, Young-sang;Shin, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.2
    • /
    • pp.196-204
    • /
    • 2016
  • World Health Organization reported that heart-related diseases such as coronary artery stenoses show the highest occurrence rate which may cause heart attack. Using Computed Tomography angiography images will allow radiologists to detect and have intervention by creating 3D roadmapping of the vessels. However, it is often complex and difficult do reconstruct 3D vessel which causes very large amount of time and previous researches were studied to segment vessels more accurate automatically. Therefore, in this paper, Region Competition, Geodesic Active Contour (GAC), Multi-atlas based segmentation and Active Shape Model algorithms were applied to segment aortic root from CTA images and the results were analyzed by using mean Hausdorff distance, volume to volume measure, computational time, user-interaction and coronary ostium detection rate. As a result, Extracted 3D aortic model using GAC showed the highest accuracy but also showed highest user-interaction results. Therefore, it is important to improve automatic segmentation algorithm in future

A study on the identity theft detection model in MMORPGs (MMORPG 게임 내 계정도용 탐지 모델에 관한 연구)

  • Kim, Hana;Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.627-637
    • /
    • 2015
  • As game item trading becomes more popular with the rapid growth of online game market, the market for trading game items by cash has increased up to KRW 1.6 trillion. Thanks to this active market, it has been easy to turn these items and game money into real money. As a result, some malicious users have often attempted to steal other players' rare and valuable game items by using their account. Therefore, this study proposes a detection model through analysis on these account thieves' behavior in the Massive Multiuser Online Role Playing Game(MMORPG). In case of online game identity theft, the thieves engage in economic activities only with a goal of stealing game items and game money. In this pattern are found particular sequences such as item production, item sales and acquisition of game money. Based on this pattern, this study proposes a detection model. This detection model-based classification revealed 86 percent of accuracy. In addition, trading patterns when online game identity was stolen were analyzed in this study.

Forest Fire Monitoring System Using Remote Sensing Data

  • Hwangbo, Ju-Won;Yu, Ki-Yun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.747-749
    • /
    • 2003
  • For forest fire monitoring in relatively cool area like Siberia, design of Decision Support System (DSS) is proposed. The DSS is consisted of three different algorithms to detect potential fires from NOAA AVHRR image. The algorithm developed by CCRS (Canada Center for Remote Sensing) uses fixed thresholds for multi-channel information like one by ESA (European Space Agency). The algorithm of IGBP (International Geosphere Biosphere Program) involves contextual information in deriving fire pixels. CCRS and IGBP algorithms are rather liberal compared to more conservative ESA algorithm. Fire pixel information from the three algorithms is presented to the user. The user considers all these information in making decision about the location fire takes place.

  • PDF

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

A Comparison of Spectrum-Sensing Algorithms Based on Eigenvalues

  • Ali, Syed Sajjad;Liu, Jialong;Liu, Chang;Jin, Minglu
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.241-247
    • /
    • 2015
  • Cognitive radio has been attracting increased attention as an effective approach to improving spectrum efficiency. One component of cognitive radio, spectrum sensing, has an important relationship with the performance of cognitive radio. In this paper, after a summary and analysis of the existing spectrum-sensing algorithms, we report that the existing eigenvalue-based semi-blind detection algorithm and blind detection algorithm have not made full use of the eigenvalues of the received signals. Applying multi-antenna systems to cognitive users, we design a variety of spectrum-sensing algorithms based on the joint distribution of the eigenvalues of the received signal. Simulation results validate that the proposed algorithms in this paper are able to detect whether the signal of the primary user exists or not with high probability of detection in an environment with a low signal-to-noise ratio. Compared with traditional algorithms, the new algorithms have the advantages of high detection performance and strong robustness