• Title/Summary/Keyword: 변조 인식

Search Result 147, Processing Time 0.033 seconds

Tempo-oriented music recommendation system based on human activity recognition using accelerometer and gyroscope data (가속도계와 자이로스코프 데이터를 사용한 인간 행동 인식 기반의 템포 지향 음악 추천 시스템)

  • Shin, Seung-Su;Lee, Gi Yong;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.286-291
    • /
    • 2020
  • In this paper, we propose a system that recommends music through tempo-oriented music classification and sensor-based human activity recognition. The proposed method indexes music files using tempo-oriented music classification and recommends suitable music according to the recognized user's activity. For accurate music classification, a dynamic classification based on a modulation spectrum and a sequence classification based on a Mel-spectrogram are used in combination. In addition, simple accelerometer and gyroscope sensor data of the smartphone are applied to deep spiking neural networks to improve activity recognition performance. Finally, music recommendation is performed through a mapping table considering the relationship between the recognized activity and the indexed music file. The experimental results show that the proposed system is suitable for use in any practical mobile device with a music player.

Development of User Music Recognition System For Online Music Management Service (온라인 음악 관리 서비스를 위한 사용자 음원 인식 시스템 개발)

  • Sung, Bo-Kyung;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.91-99
    • /
    • 2010
  • Recently, recognizing user resource for personalized service has been needed in digital content service fields. Especially, to analyze user taste, recommend music and service music related information need recognition of user music file in case of online music service. Music related information service is offered through recognizing user music based on tag information. Recognition error has grown by weak points like changing and removing of tag information. Techniques of content based user music recognition with music signal itself are researched for solving upper problems. In this paper, we propose user music recognition on the internet by extracted feature from music signal. Features are extracted after suitable preprocessing for structure of content based user music recognition. Recognizing on music server consist of feature form are progressed with extracted feature. Through this, user music can be recognized independently of tag data. 600 music was collected and converted to each 5 music qualities for proving of proposed recognition. Converted 3000 experiment music on this method is used for recognition experiment on music server including 300,000 music. Average of recognition ratio was 85%. Weak points of tag based music recognition were overcome through proposed content based music recognition. Recognition performance of proposed method show a possibility that can be adapt to online music service in practice.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

UWB WBAN Receiver for Real Time Location System (위치 인식이 가능한 WBAN 용 UWB 수신기)

  • Ha, Jong Ok;Park, Myung Chul;Jung, Seung Hwan;Eo, Yun Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.98-104
    • /
    • 2013
  • This paper presents a WBAN UWB receiver circuit for RTLS(real time location system) and wireless data communication. The UWB receiver is designed to OOK modulation for energy detection. The UWB receiver is designed for sub-sampling techniques using 4bit ADC and DLL.The proposed UWB receiver is designed in $0.18{\mu}m$ CMOS and consumes 61mA with a 1.8V supply voltage. The UWB receiver achieves a sensitivity of -85.7 dBm, a RF front-end gain of 42.1 dB, a noise figure of 3.88 dB and maximum sensing range of 4 meter.

Design of Electronic ID System Satisfying Security Requirements of Authentication Certificate Using Fingerprint Recognition (지문 인식을 이용하여 공인인증서의 보안 요건을 만족하는 전자 신분증 시스템의 설계)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.610-616
    • /
    • 2015
  • In this paper, an electronic ID system satisfying security requirements of authentication certificate was designed using fingerprint recognition. The proposed electronic ID system generates a digital signature with forgery prevention, confidentiality, content integrity, and personal identification (=non-repudiation) using fingerprint information, and also encrypts, sends, and verify it. The proposed electronic ID system exploits fingerprint instead of user password, so it avoids leakage and hijacking. And it provides same legal force as conventional authentication certificate. The proposed electronic ID consists of 4 modules, i.e. HSM device, verification server, CA server, and RA client. Prototypes of all modules are designed and verified to have correct operation.

Scientists Behaving Badly, Why? : 연구윤리의 저해요인들

  • Park, Gi-Beom;Kim, Jong-Yeong;Lee, Gwang-Ho
    • 한국과학기술학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.1-34
    • /
    • 2008
  • 본 인식 조사에서 나타난 결과와 개선 방안의 도출과 관련한 시사점을 요약하면 다음과 같다. 첫째, 국내 연구부정행위 실태는 우려할만한 수준으로 나타났다. 위조, 변조, 표절, 부당한 저자 배분, 업적 부풀림 등 연구부정행위에 대해 연구비 유용이나 횡령보다 훨씬 더 만연한 것으로 응답하였다. 연구부정행위가 발각되는 정도에 대해서는 의견이 분분하였으나 처벌의 수위는 엄격하지 않다고 생각하는 것으로 나타났다. 본인의 연구윤리 의식이 타인에 비해 높은 것으로 자부하고 있으나 부정행위 인지시의 행동에 대해서는 바람직하다고 생각하는 행동과 자신의 예상 행동 사이에 괴리를 보였고, 바람직하다고 생각하는 행동도 매우 소극적인 것으로 나타났다. 부정행위 실태 조사에서 나타난 중요한 사실은 주로 기초 연구를 수행하는 과기부/교육부 사업 수행자가 응용이나 개발 연구를 수행하는 산자부/정통부 사업 수행자에 비해 자신의 연구 분야에서 연구부정행위가 훨씬 더 만연해 있는 것으로 응답한 것이다. 둘째, 가장 심각한 연구윤리 저해 요인에 대해서는 단기간 성과의 강조, 연구 수주의 경쟁 심화, 정량적 성과 주의 등을 꼽았으며, 전체적으로 개인적/문화적 요인보다는 구조적/조직적 요인, 특히 구조적 요인이 더 중요한 것으로 인식하고 있었다. 신뢰도 분석 결과 제3장에서의 분석을 바탕으로 본 연구에서 제시한 구조적, 조직적, 개인적, 문화적 요인의 구분은 유효한 구분으로 나타났다. 대학에 비해 정출연 소속 연구자들이 구조적 요인이 연구부정행위와 더 관련이 많다고 인식하고 있었으며, 기업 소속 연구자들은 구조적 요인이나 조직적 요인과의 관련성이 더 적은 것으로 인식하고 있어 본 연구에서 제시한 여러 저해 요인들이 대학이나 정출연에 더욱 밀접한 것으로 나타났다. 개인적 요인에 대해서는 여성이나 고연령층에서 부정행위와의 관련성을 더 크게 느끼고 있었다. 셋째, 개선 방안에 대해서는 과도한 연구비의 집중 방지, 소규모 개인과제 확대, 평가의 전문성과 공정성 확보를 가장 효과적인 방안으로 인식하고 있었다. 부정행위에 대한 처벌의 강화와 양적 평가의 개선에 대해서도 효과를 높이 기대하고 있었다. 연구윤리 교육이나 상대 평가의 강화, 진실성 검증 시스템의 보완 등에 대해서는 큰 효과를 기대하지 않고 있었으나 이는 국내에서 그동안 연구윤리에 대한 체계적 교육이나 진실성 검증 시스템이 존재하지 않은 탓에 연구자들이 그 효과를 잘 인식하지 못하고 있다는 점이 고려되어야 할 것이다. 개선 방안을 크게 평가, 선정, 수행, 연구윤리의 인프라로 구분하였을 때에는 선정과 평가와 관련된 개선이 시급한 것으로 인식하고 있었다. 사업별로는 과기부/교육부 사업 수행자가 선정과 관련된 개선의 효과를 더욱 크게 느끼고 있었고 소속기관으로는 대학 연구자들이 더욱 크게 느끼고 있어, 소규모 과제의 확대와 연구비 집중 문제 해결, 경쟁 완화 등이 대학과 기초연구분야에 더욱 절실하다는 것을 나타내었다. 전체적으로 제시된 세부 항목에 대해 과기부/교육부 사업 수행자가 산자부/정통부 사업 수행자보다 효과성을 높게 보고 있는 것은 연구부정행위 실태에 대해서도 더 심각하게 인식하는 것과 맥락을 같이한다고 볼 수 있다. 따라서 본 연구에서 제안하는 여러 개선 방안들을 단계적으로 적용한다고 할 때 우선 기초연구나 개인 단위 과제 중심으로 적용하는 것이 효과성이나 필요성의 측면에서 모두 바람직한 것으로 판단된다.

  • PDF

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

Change of Recognition Range According to Modulation Index of the 13.56MHz RFID Type B System (13.56MHz RFID Type B 시스템에서 변조지수에 따른 인식거리의 변화)

  • Kim, Yong-Hee;Yang, Woon-Geun;Yoo, Hong-Jun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.119-122
    • /
    • 2005
  • In this paper, we investigated the recognition range according to modulation index for the ISO(International Standards Organization) 14443 13.56MHz contactless Type B RFID(Radio Frequency IDentification) system. We measured recognition range with changing modulation index step by step from 5% to 24% where we used 4 samples of Type B transponder with different resonance frequencies between 13.838MHz and 17.200MHz. While gradually increasing a distance in vertical direction from the center of the reader antenna, we measured the distance where the transponder's PUPI(Pseudo Unique PICC(Proximity IC Card) Identifier) is recognized continuously during 10 seconds and the distance where the transponder's PUPI is recognized at least two times during 5 seconds. From the measurement results, we found that the best recognition ranges were achieved when the reader had modulation index between 11% and 14%.

  • PDF

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.