• Title/Summary/Keyword: 보안인식

Search Result 1,354, Processing Time 0.037 seconds

Effective Feature Vector for Isolated-Word Recognizer using Vocal Cord Signal (성대신호 기반의 명령어인식기를 위한 특징벡터 연구)

  • Jung, Young-Giu;Han, Mun-Sung;Lee, Sang-Jo
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.3
    • /
    • pp.226-234
    • /
    • 2007
  • In this paper, we develop a speech recognition system using a throat microphone. The use of this kind of microphone minimizes the impact of environmental noise. However, because of the absence of high frequencies and the partially loss of formant frequencies, previous systems developed with those devices have shown a lower recognition rate than systems which use standard microphone signals. This problem has led to researchers using throat microphone signals as supplementary data sources supporting standard microphone signals. In this paper, we present a high performance ASR system which we developed using only a throat microphone by taking advantage of Korean Phonological Feature Theory and a detailed throat signal analysis. Analyzing the spectrum and the result of FFT of the throat microphone signal, we find that the conventional MFCC feature vector that uses a critical pass filter does not characterize the throat microphone signals well. We also describe the conditions of the feature extraction algorithm which make it best suited for throat microphone signal analysis. The conditions involve (1) a sensitive band-pass filter and (2) use of feature vector which is suitable for voice/non-voice classification. We experimentally show that the ZCPA algorithm designed to meet these conditions improves the recognizer's performance by approximately 16%. And we find that an additional noise-canceling algorithm such as RAST A results in 2% more performance improvement.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

국내 인터넷전문은행 설립시 예상되는 전자금융리스크에 대한 대응방안 연구

  • Kim, Tae-Ho;Park, Tae-Hyoung;Lim, Jong-In
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.33-48
    • /
    • 2008
  • 최근 은행의 소유지분한도와 설립자본금 등에 대한 정부의 금융규제 완화로 인터넷전문은행의 설립 가능성이 높아지고 있다. 그러나 우리나라의 전자금융환경은 전자금융거래법 제정에 따라 금융기관의 입증책임을 강화함으로써 금융기관의 전자금융리스크가 상대적으로 크게 증가하였다. 또한, 정보 공격기술 및 수법의 발달로 전자금융보안에 대한 위협이 지속적으로 증가하고 있다. 이외 에도 신BIS 리스크 평가에 IT운영리스크가 포함되는 등 금융환경 변화 및 정보통신 기술의 발전으로 인한 전자금융리스크가 계속 확대되고 있는 추세에 있다. 이러한 금융환경 변화와 함께 서비스채널이 인터넷에 집중되는 인터넷전문은행은 기존의 전통적인 은행과 차별되는 리스크에 추가적으로 노출될 위험성이 높다. 이러한 리스크에 대한 인식 및 대비 부재는 금융소비자가 금융권 전자금융거래에 대한 불신으로 확산되거나, 금융시장의 불안정성을 야기하는 금융사고로 이어져 자칫 국내 전자금융의 발전을 저해하는 심각한 요소가 될 수 있다. 본 논문에서는 국내 금융환경과는 차이가 있지만, 인터넷전문은행이 가져올 전자금융의 기술적 변화는 유사하다는 점에서 해외 주요국가의 인터넷전문은행 현황과 전자금융부문을 중심으로 인터넷전문은행 설립인가 사례를 살펴보고, 국내에서 인터넷전문은행 설립시 우리가 취해야 할 입장에 대해 시사점을 얻고자 하였다. 그리고 국내 전자금융 환경에서 전통적인 일반은행과 차별되거나 인터넷전문은행 고유의 특성으로 발생되는 주요 전자금융리스크를 다섯 가지로 분석하였고, 이러한 전자금융리스크를 줄이기 위한 대응방안을 모색해 보았다. 정부의 금융규제 완화는 금융자유화를 진전시켜 금융거래가 자유경쟁원리에 입각해 이루어짐에 따라 국민경제의 발전에 있어서 바람직한 결과를 얻고자 하는 것이다. 그러나 다른 한편으로 과도한 리스크에 노출 될 경우에는 금융시장의 불안정성을 야기하고 이로 인해 역 선택과 도덕적 해이를 야기 시키는 등 여러 가지의 폐해를 줄 수도 있다 이러한 폐해를 줄이기 위해서는 인터넷전문은행의 고유한 특성으로 수반되는 리스크와 상대적으로 그 중요성이 부각되는 전자금융리스크에 대한 관리 감독을 강화해야 한다. 또한 이러한 리스크 관리강화를 위한 제도적 장치는 인터넷전문은행의 자율성과 책임성을 부여하는 방향으로 이루어지는 것이 바람직하다. 인터넷전문은행이 실질적으로 다수의 금융이용자에게 다양한 혜택과 효율적인 금융서비스를 제공하기 위해서는 초기 사업계획 심사 단계에서부터 위험성이 크게 증가하는 전자금융리스크에 대해서, 적절한 관리방안 수립을 통해 예상되는 리스크를 줄이기 위한 노력이 필요하다고 생각한다. 그리고 인터넷전문은행에 대한 구체적인 인가요건이 마련되지 못한 현 상황에서, 국내 인터넷전문은행 설립이 우리나라 전자금융거래에 발전적 역할을 할 수 있도록 앞으로 더 많은 논의와 연구가 진행될 필요가 있다.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

Fire Detection using Deep Convolutional Neural Networks for Assisting People with Visual Impairments in an Emergency Situation (시각 장애인을 위한 영상 기반 심층 합성곱 신경망을 이용한 화재 감지기)

  • Kong, Borasy;Won, Insu;Kwon, Jangwoo
    • 재활복지
    • /
    • v.21 no.3
    • /
    • pp.129-146
    • /
    • 2017
  • In an event of an emergency, such as fire in a building, visually impaired and blind people are prone to exposed to a level of danger that is greater than that of normal people, for they cannot be aware of it quickly. Current fire detection methods such as smoke detector is very slow and unreliable because it usually uses chemical sensor based technology to detect fire particles. But by using vision sensor instead, fire can be proven to be detected much faster as we show in our experiments. Previous studies have applied various image processing and machine learning techniques to detect fire, but they usually don't work very well because these techniques require hand-crafted features that do not generalize well to various scenarios. But with the help of recent advancement in the field of deep learning, this research can be conducted to help solve this problem by using deep learning-based object detector that can detect fire using images from security camera. Deep learning based approach can learn features automatically so they can usually generalize well to various scenes. In order to ensure maximum capacity, we applied the latest technologies in the field of computer vision such as YOLO detector in order to solve this task. Considering the trade-off between recall vs. complexity, we introduced two convolutional neural networks with slightly different model's complexity to detect fire at different recall rate. Both models can detect fire at 99% average precision, but one model has 76% recall at 30 FPS while another has 61% recall at 50 FPS. We also compare our model memory consumption with each other and show our models robustness by testing on various real-world scenarios.

A Study on the Actual Condition and Improvement Plan of the Space for Elementary School Care Classroom (초등돌봄교실 공간 조성 실태 분석 및 개선방안 연구)

  • Cho, Jin-Il;Choi, Hyeong-Ju
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.18 no.1
    • /
    • pp.1-16
    • /
    • 2019
  • The purpose of this study is to diagnose the problems of an elementary school care classroom in terms of facilities and physical environment and to suggest an improvement plan for building safer and more pleasant facilities and environment in further proceeding the policies of a whole-day care classroom. To this end, we analyzed the main contents of the domestic policies for elementary school care classes and the related spatial standards amongst the management plans of provincial education offices nationwide. In addition, we analyzed the relevant care facility standards of advanced countries such as the U.S., Australia, and Singapore and diagnosed the physical environmental level of Korean care classes in comparison to the international standards. Afterwards, we conducted a case study of elementary school care classes in order to examine the key issues with the environment of care classes, the causes of these issues and the user recognition and demand. The key results of this research are as follows. First, it is necessary to elaborate and refine the guidelines on elementary school care classrooms. Second, in order to provide high-quality elementary care services, it is important to have a combined classroom that can be operated at the level equivalent to or similar to a dedicated care classroom. Third, it is necessary to regularly check the facilities and environment of the elementary school care classroom.

Operation of a 3-Year Training Program for Elementary and Secondary Administrators to Foster Creative Convergence Talent (창의융합 인재 양성을 위한 3년간의 초·중등 관리자 연수 프로그램 운영)

  • Jung, Yujin;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.177-186
    • /
    • 2021
  • The 2015 revised curriculum is structured around the core competencies of the 21st century, this is in line with the world's flow of education, such as OECD Education 2030. A future practical leading model was studied to provide a variety of creative teaching and learning experiences to elementary and Secondary students using intelligent information technology to cultivate core competencies such as ICT and computing thinking. In order for this practical model to stably settle the school field, the training was planned and operated to strengthen the creative convergence education capacity required by the teachers at the unit school through various types of the training. In particular, a nationwide administrators training program was operated for three years, reflecting the new curriculum, teaching and learning methods, and evaluation that can lead to future convergence talent training. In this paper, the perception of creative convergence education was investigated and analyzed considering the influence that administrators may have on the school field. Based on this, through the three-year operation results of the training, it was intended to establish a new training method for stable access to future creative convergence education under the post-corona era's social issues.

Effects of Intensive Course Program on the Sexual Violence for the Re-crime Risky Group in the Sex Offender: Focused on Impulsivity, Anger Expression, Rape Myth, and Self Esteem (재범위험 성폭력사범 집중교육 프로그램의 효과: 충동성, 분노표현, 강간통념, 자기존중감을 중심으로)

  • Gang, Chun-Hee;Kwon, Jae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.707-719
    • /
    • 2021
  • The purpose of this study was to find out how effect does the second-stage which is the intensive course program for sexual offenders of three-stage(basic, intensive and advanced remedial) on impulsivity, anger expression, rape myth and self-esteem of sexual offenders. To this end, 10 people waiting for the second-stage intensive education among sexual violence offenders serving at M prison located in J province were selected as subjects for the study. To verify the effectiveness of the program, repeated measurement design(pre, post and one month post test) was conducted, and a total of 200 hours of 'Intensive Course Program on the Sexual Violence' was conducted to the subjects. The results of this study are as follows. It was confirmed that the intensive course program on the sexual violence for the re-crime risky group in the sex offender is effective in reducing impulsivity and anger expression, which are risk factors of sexual crime, bringing positive changes to rape myths, which are distorted sexual perceptions of sexual violence criminals, and improving self-esteem. Finally, it suggested the necessity of continuous development and improvement of sexual violence preventive programs targeting sexual offenders, and construction of systematic supervision and related system to ensure the effectiveness of remedial after release of sexual offenders.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.