• Title/Summary/Keyword: 객체식별

Search Result 304, Processing Time 0.024 seconds

A Location Prediction System for Moving Objects in Battlefield Analysis (전장분석을 위한 이동 객체의 위치 예측 시스템)

  • 안윤애;류근호;조동래
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.765-777
    • /
    • 2002
  • For the battlefield analysis, it is required to get correct information about the identification and moving status of target enemy units. However, it is difficult for us to collect all of the information perfectly, because of the technology of communications, jamming, and tactics. Therefore, we need a reasoning function that predicts and analyzes future moving status for target units by using collected moving information and domain knowledge. Especially. since the moving units have characteristics of moving objects, which change their position and shape over time, they require functions to manage and predict locations of moving objects. Therefore, in this paper, we propose a location prediction system of moving units for battlefield analysis. The proposed system not only predicts unknown units, unidentified units, and main strike directions to application domain for battlefield analysis, but also estimates the past or future locations of moving objects not stored in a database.

Development of Integrated Spatial Information Identifier for Developing 3D Cadastral Information System (3차원 지적정보시스템 개발을 위한 통합 공간정보식별자 개발)

  • Song, Myung Su;Song, Sang Cheol;Jang, Yong Gu;Lee, Sung Ho
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.11-17
    • /
    • 2012
  • The study aims to secure an integrated UFID system-based ID system as it defines the three-dimensional land registration record through selection and standardization of objects. By comparing the integrated ID system secured by the study and the objected ID system proposed by Seoul City, the study came up with practicality of the integrated ID system for the three-dimensional land registration record information system. An integrated UFID-based intellectual spacial information which is consisted of 41 figures in total was developed by the study. The study confirmed the practicality of the integrated ID system by comparing it with the objected ID of the three dimensional land registration record information system established by Seoul City.

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

Process Design and Case Study for Efficient Function Point Measurement Based on Object Oriented (객체지향 기반 효율적인 기능점수 측정 프로세스 설계 및 사례연구)

  • Kim, Dong-Sun;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.15D no.3
    • /
    • pp.375-386
    • /
    • 2008
  • Recently, development paradigm of information system is turning into object oriented and component based, and this methodology is leading the software industry. To acclimatize aptly to this trend, users demand the assessment of software expenses to change with the appropriate model of computing costs of the environment, and some people are actually studying the concept of Object Oriented Function Point and UCP method. Especially, Object Oriented Function Point Measurement Process has good points in overcoming the bound of LOC and the existing the Function Point Measurement Process because Object Oriented Function Point Measurement Process is applicable to the early stage of development project mainly with the used cases, and valid to the life long period as the each stage of software products develops, and always understandable to communicate with users by the UML mark rules. Accordingly, this research is to measure Functional Point at ROFP and AOFP in accordance with the development project of information system by the national defense CBD methodology procedures and UML Interrelation Analysis that are recently and widely used in the developmental environment of object oriented information system. Furthermore, this study suggests the measurement method to obtain Functional Point, and identifies service function and object/class function in the correlation analysis of use case and class based on the products and UML modeling via traditional FPA model and object oriented FPA model. Above all, this study is to demonstrate the improvement of traditional Function Point Measurement Process, IFPUG-CPM and software cost basis, and reveal Function Point Measurement Process, which is appropriate to the development of object oriented information system, and suggest the evaluation results of the compatibility through case studies.

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees (R-트리를 활용한 시공간 질의 처리의 위치 개인정보 보호 기법)

  • Kwon, Dong-Seop
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.85-98
    • /
    • 2010
  • The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Plug-in Diverse Parsers Within Code Visualization System with Redefining the Coupling and Cohesion in the Object-Oriented Paradigm (객체지향 관점의 결합도 & 응집도 재정의와 코드 가시화 시스템내 파서 플러그인화 구현)

  • Lee, Jin Hyub;Park, Ji Hun;Byun, Eun Young;Son, Hyun Seung;Seo, Chae Yun;Kim, R. Young Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.229-234
    • /
    • 2017
  • Because of the invisible nature of software and the bad coding habits (bad smell) of the existing developers, there are many redundant codes and unnecessary codes, which increases the complexity and makes it difficult to upgrade software. Therefore, it is required a code visualization so that developers can easily and automatically identify the complexity of the source code. To do this, it is necessary to construct SW visualization tool based on open source software and redefine the coupling and cohesion according to the object oriented viewpoint. Specially to identify a bad smell code pattern, we suggest how to plug-in diverse parsers within our tool. In this paper, through redefining coupling and cohesion from an object oriented perspective, we will extract bad smell code patterns within source code from inputting any pattern into the tool.

Image Segmentation of Adjoining Pigs Using Spatio-Temporal Information (시공간 정보를 이용한 근접 돼지의 영상 분할)

  • Sa, Jaewon;Han, Seoungyup;Lee, Sangjin;Kim, Heegon;Lee, Sungju;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.473-478
    • /
    • 2015
  • Recently, automatic video monitoring of individual pigs is emerging as an important issue in the management of group-housed pigs. Although a rich variety of studies have been reported on video monitoring techniques in intensive pig farming, it still requires further elaboration. In particular, when there exist adjoining pigs in a crowd pig room, it is necessary to have a way of separating adjoining pigs from the perspective of an image processing technique. In this paper, we propose an efficient image segmentation solution using both spatio-temporal information and region growing method for the identification of individual pigs in video surveillance systems. The experimental results with the videos obtained from a pig farm located in Sejong illustrated the efficiency of the proposed method.