• Title/Summary/Keyword: 디지털 사용 인식

Search Result 727, Processing Time 0.026 seconds

Video Digital Doorlock System for Recognition and Transmission of Approaching Objects (접근객체 인식 및 전송을 위한 영상 디지털 도어락 시스템 설계)

  • Lee, Sang-Rack;Park, Jin-Tae;Woo, Byoung-Hyoun;Choi, Han-Go
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.237-242
    • /
    • 2014
  • Current digital door lock systems are mainly designed for users' convenience, so they have weakness in security. Thus, this paper suggests a video digital doorlock system grouped with a relay device, a server, and a digital doorlock with a camera, sensors, and communication modules, which is detecting or recognizing objects approaching to the front of the door lock system and sending images and door-opening information to users' smart devices. Experiments showed that the suggested system has 96~98% recognition rate of approaching objects and requires 17.1~23.9 seconds for transmission on average, depending on network systems. Therefore, the system is thought to have enough capability for real time security response by monitoring the front area of the doorlock system.

Study on Hashing of CD-R Media from the Viewpoint of Digital Forensics (디지털 포렌식 관점에서 CD-R 미디어의 해쉬 값 생성에 관한 연구)

  • Park, Jung-Heum;Kim, Kwon-Youp;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.167-170
    • /
    • 2008
  • 해쉬 알고리즘은 디지털 포렌식 수사에서 디지털 증거의 무결성을 증명하기 위해 널리 사용되고 있다. 디지털 증거의 무결성은 동일한 데이터에서만 같은 해쉬 값이 계산된다는 성질에 의하여 증명된다. 일반적으로 동일한 데이터에 대한 해쉬 값은 서로 다른 포렌식 툴을 이용해서 계산을 해도 항상 같은 값이 출력될 것이라고 인식하고 있다. 하지만, CD-R 미디어의 경우에는 해쉬를 계산하는 포렌식 툴에 따라 값이 다르다는 특성이 있다. 이것은 해쉬 값이 CD 제작 도구에서 CD-R 미디어에 데이터를 기록하는 방식과 각 포렌식 툴 별로 CD-R 미디어를 인식하는 방식에 의해 영향을 받기 때문이다. 이러한 특성은 CD-R 미디어의 무결성 증명 시에 문제가 될 여지가 있기 때문에 디지털 포렌식 수사 절차에서 반드시 고려되어야 한다. 본 논문에서는 CD-R 미디어의 해쉬 값에 영향을 주는 요소에 대해 기술하고, 실험용 CD-R 미디어를 제작하여 대표적인 디지털 포렌식 도구들을 이용해서 확인한다. 이를 통해, 디지털 포렌식 수사 절차에서 CD-R 미디어에 대한 해쉬 값을 계산할 때 고려해야 할 사항을 제안한다.

  • PDF

A Study on Forensic Tool Design For Anticipatory Security Management In IoT Environment (IoT 환경에서 선제적 보안관리를 위한 포렌식 도구 설계)

  • Park, Gwangmin;Na, Onechul;Kim, Eunji;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.399-401
    • /
    • 2015
  • 디지털 포렌식은 그동안 보안의 차선이 되어왔다. 디지털 포렌식은 늘 보안 사건이 일어난 후에만 사용되는 것으로 인식되었다. 산업의 규모가 커지고 보안의 범위가 넓어지면서 보안은 자본주의 사회에서 필수가 되었다. 이에 따라 디지털 포렌식의 역할은 중요해졌고 관심도 늘어나게 되었다. 하지만 보안 사건이 일어난 후, 그 뒤를 따라가는 것은 힘들고 한계가 있다. 특히 정보는 한번 새어나가면 걷잡을 수 없고, 경제적 손실도 막대하다. 또한 디지털 포렌식을 통해 증거를 수집한다고 해도 디지털 정보는 특성상 조작하기가 쉽기 때문에 법원에서 증거로 인정받기 위해서는 매우 까다로운 절차를 거쳐야 한다. 아직까지 한국에서는 디지털 증거를 어디까지 인정해야 하는지에 대한 명확한 기준이 없기 때문에 까다로운 절차를 거쳤다고 해서 증거로 인정받는다는 보장이 없다. 따라서 보안에 대해서는 예방하는 것이 최선이고 필수이다. 이 논문에서는 그동안 차선으로 인식되었던 디지털 포렌식 도구를 이용하여 보안 사건보다 한 발짝 앞서 보안을 관리하는 방법에 대해 검토하고자 한다.

An Efficient Classification of Digitally Modulated Signals Using Bandwidth Estimation (대역폭 추정을 적용한 효율적인 디지털 변조 신호 분류)

  • Choi, Jong-Won;Ahn, Woo-Hyun;Seo, Bo-Seok
    • Journal of Broadcast Engineering
    • /
    • v.22 no.2
    • /
    • pp.257-260
    • /
    • 2017
  • In this letter, we propose an efficient automatic modulation recognition (AMR) method which classifies digitally modulated signals by estimating the bandwidth. In AMR, feature-based methods are widely used and the accuracy of the features is highly dependent on the number of symbols and the number of samples per symbol (NSPS). In this letter, at first, we coarsely estimate the bandwidth of the oversampled signals, and then decrease the sample rate to yield adequate NSPS. As a result, more symbols are used for AMR and the correct classification rate becomes high under the same number of samples.

Artificial Vision System using Human Visual Information Processing (시각정보처리과정을 이용한 인공시각시스템)

  • Seo, Chang-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.349-355
    • /
    • 2014
  • In this paper, we propose the artificial vision system using human visual information processing and wavelet. Artificial vision system may be used for the visually impaired person and the machine recognition system. In this paper, we have constructed the information compression process to ganglion cells from the human retina. And we have reconstructed the primary visual information using recovery process to primary visual cortex from ganglion. Primary visual information is constructed by wavelet transformation using a high frequency and low frequency response. In the experiment, we used the faces database of AT&T. And the proposed method was able to improve the accuracy of face recognition considerably. And it was verified through experiments.

The development of AT-Cut Quartz Organic Vapor Recognizing System Using Artificial Neural Network (인공신경망을 이용한 수정진동자 유기용매 인식시스템의 개발)

  • Park, Soo-Heang;Ryu, Min-Su
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.6 no.1
    • /
    • pp.31-36
    • /
    • 2003
  • 8개의 수정진동자 위에 서로 다른 종류의 Lipid를 코팅하여서 만든 센서 배열을 가지고 유기용매를 인식할 수 있는 System을 구성한다. 유기용매 인식센서에 대한 수학적 모델을 사용하여 여러 가지 유기용매에 대한 센서의 응답으로부터 센서 표면과 유기용매 간의 물질 전달속도 패턴과 친화력 패턴을 얻어 유기용매 종류를 인식하였다. 패턴인식은 인공신경망을 이용하였으며 인공신경망의 연결 강도 수정은 Levenberg-Marquardt 알고리즘을 사용하였다. 신경망의 출력은 4개로 하였고, 디지털 신호인 0과 1의 조합으로 유기용매 종류를 구분하였다. 이 시스템을 이용하여 9개의 유기용매 Acetone, Benzene, Chloroform, Carbon-tetrachloride, Ethylacetate, Buthylacetate, Cyclohexane, Dichloromethane, 1,1,2,2,Tetrachloroethane, 2,2,4Trimethylpentane을 구분하여 인식할 수 있었다.

  • PDF

A Comparison Counterfeit Goods use Behavior in Korea and China Consumer: focus on Motivation, Benefit and Cost Factor (한중 소비자의 위조품 구매태도 비교분석: 동기와 혜택 및 손실요인을 중심으로)

  • Yu, Seung-Yeob;Kim, Na-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.117-124
    • /
    • 2012
  • This study started why do consumers use the counterfeit goods. We executed the pretest through the depth interview, and made an purchase motivation scale, useful benefit factor and cost factor scale of counterfeit goods. We found out having the recognition difference of China consumers with Korea about these. The results is as follows. First, A counterfeit motivation appeared to the recognition difference appeared in a ostentation, economical efficiency and self-satisfaction factor with korea and china consumers. Second, counterfeit useful benefit factor organized to a personal significantly and economic benefit and the recognition difference appeared. Third, Counterfeit good useful cost composed to the personal good-quality, economic and social image of cost factors, and the recognition significantly difference appeared to all of cost factors with Korea and China consumers. These results are helpful for a depth understanding about the counterfeit use behavior, and will be utilized for the public campaign to reduce such behavior.

Factors Influencing Reuse Intention of Tablet PC Ordering Services: From the Perspective of Shadow Work (태블릿PC 주문서비스 재사용 의도에 영향을 미치는 요인: 그림자노동 관점)

  • Qin, Yihang;Wu, Haoxi;Koh, Joon
    • Journal of Service Research and Studies
    • /
    • v.13 no.4
    • /
    • pp.1-23
    • /
    • 2023
  • Tablet PCs are gaining increasing popularity in today's context, offering convenience in store operations. However, some customers may have complaints. From the perspective of shadow labor, customers may perceive using tablet PCs as additional tasks, implying that tasks have been transferred from service staff to customers themselves. Therefore, this study aims to investigate the causes of customers' perception of shadow labor when using tablet PCs (perceived difficulty of use and perceived compulsion to use) and how these perceptions can influence their intention to reuse tablet PC ordering services. Additionally, the study examines whether customers' perception of shadow labor is influenced by digital literacy and information overload and investigates the positive impact of benefits arising from using tablet PCs on their perception of shadow labor. This research conducted an online survey through the Chinese survey specialist website "Wenjuanxing," targeting customers who use tablet PCs to place orders in restaurants. After collecting a total of 376 valid data points, demographic characteristics, frequency analysis, reliability analysis, validity analysis, correlation analysis, and regression analysis were conducted using SPSS 24.0. The empirical results from the 376 respondents reveal that digital literacy and information overload affect the perception of shadow labor and also influence the intention to reuse tablet PC ordering services. Furthermore, benefits showed significant moderating effects on these relationships.

Survey on the Use and Awareness of Nail Convergent Strengtheners (네일 융복합보강제의 사용실태 및 인식도 조사)

  • Kim, Mi-Won;Back, Dae-Jin
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.535-542
    • /
    • 2015
  • As the nail industry has grown, concerns on damages to natural nails due to nail services and interests on nail products have been increased. This study is on nail convergent strengtheners which reduce damages on natural nails, and especially focused on the use and awareness of nail strengtheners by nail technicians. First, documentary research on previous studies was conducted to define nail services, nail damages, and nail strengtheners. Preliminary survey and main survey was conducted by KSDC on-line survey tool and the result was analyzed by frequency analysis, cross analysis, and correlation analysis by KSDC advanced statistical program. As a result, nail technicians have the high level of awareness on characteristics, effects, how to use, and application process of nail strengtheners. Nail technicians are the mid level of awareness on the ingredients of nail strengtheners.

An Improved RSR Method to Obtain the Sparse Projection Matrix (희소 투영행렬 획득을 위한 RSR 개선 방법론)

  • Ahn, Jung-Ho
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.605-613
    • /
    • 2015
  • This paper addresses the problem to make sparse the projection matrix in pattern recognition method. Recently, the size of computer program is often restricted in embedded systems. It is very often that developed programs include some constant data. For example, many pattern recognition programs use the projection matrix for dimension reduction. To improve the recognition performance, very high dimensional feature vectors are often extracted. In this case, the projection matrix can be very big. Recently, RSR(roated sparse regression) method[1] was proposed. This method has been proved one of the best algorithm that obtains the sparse matrix. We propose three methods to improve the RSR; outlier removal, sampling and elastic net RSR(E-RSR) in which the penalty term in RSR optimization function is replaced by that of the elastic net regression. The experimental results show that the proposed methods are very effective and improve the sparsity rate dramatically without sacrificing the recognition rate compared to the original RSR method.