• Title/Summary/Keyword: 보안인식

Search Result 1,354, Processing Time 0.034 seconds

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Wavelet Transform-based Face Detection for Real-time Applications (실시간 응용을 위한 웨이블릿 변환 기반의 얼굴 검출)

  • 송해진;고병철;변혜란
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.829-842
    • /
    • 2003
  • In this Paper, we propose the new face detection and tracking method based on template matching for real-time applications such as, teleconference, telecommunication, front stage of surveillance system using face recognition, and video-phone applications. Since the main purpose of paper is to track a face regardless of various environments, we use template-based face tracking method. To generate robust face templates, we apply wavelet transform to the average face image and extract three types of wavelet template from transformed low-resolution average face. However template matching is generally sensitive to the change of illumination conditions, we apply Min-max normalization with histogram equalization according to the variation of intensity. Tracking method is also applied to reduce the computation time and predict precise face candidate region. Finally, facial components are also detected and from the relative distance of two eyes, we estimate the size of facial ellipse.

The Relationship with Electronic Trust, Web Site Commitment and Service Transaction Intention in Public Shipping B2B e-marketplace (해운 B2B e-marketplace의 전자적 신뢰, 사이트몰입 및 서비스 거래의도와의 관계성)

  • Kim, Yong-Man;Kim, Seog-Yong;Lee, Jong-Hwan;Shim, Gyu-Yeol
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.4
    • /
    • pp.113-139
    • /
    • 2007
  • This study aims to, looking from a standpoint of network, has investigated the shipping industry's B2B e-marketplace, the characteristics that can earn electronic trust from the users, and characteristics of the web-site. It has examined the mechanism whereby electronic trust be earned and how it affects web-site involvement and service transaction intention. Ultimately, The study attempts to make proposals whereby such trust can lead for a cooperative trading community in the shipping industry's B2B e-marketplace The Covalence structural equation modeling was designed and empirically tested for the shipping industry's B2B e-marketplace. The shipping industry employees were given questionnaires and data were analyzed. Except for perceived security of the three characteristic factors on the web-site, the perceived site quality and characteristics factors in operation only affected co-variables. Transaction Fairness was determined to be the most important factor among exogenous factors increasing electronic trust. With regards to transaction rules, if a transaction is beneficial only to one side, then no long term transaction will not take place. If the concerned parties properly recognize that transaction fairness is crucial to electronic transaction, then it will enormously contribute to successful operations of shipping e-marketplace. Also, Perceived efficiency in transaction also affects electronic trust. This reduces transaction costs and speeds up and simplifies the transaction process. It has reduced greater time and costs than existing off-line transaction, and would positively affect electronic trust. By making an open forum for participants to obtain information for transaction, they can gather useful information, and at the same time, the web-site operator can provide information, which, in turn, will increase electronic trust in electronic transaction. Furthermore, such formation of trust in electronic transaction influences shipping companies in such a way that they will want to continuously participate in the transaction, raising web-site involvement. The result of increased trust is that shipping companies in the future will do business with each other and form a foundation for continuous transactions amongst themselves. Consequently, the formation of trust in electronic transaction greatly influences web-site involvement and service transaction intention. The results of the study have again proved that in order to maintain continuous business relationship with the current clients, electronic trust in virtual space, which operates the shipping industry's B2B e-marketplace, is important for the interested parties.

  • PDF

Strategy for Bio-Diversity and Genetic Conservation of Forest Resources in Korea (생물종(生物種) 다양성(多樣性) 및 삼림유전자원(森林遺傳資源) 보존(保存) 전략(戰略))

  • Park, Young Goo
    • Journal of Korean Society of Forest Science
    • /
    • v.83 no.2
    • /
    • pp.191-204
    • /
    • 1994
  • Due to its topographic complexities and various climatical condition, Korea exhibits diverse forest types. Dominant tree species in this zone are Quercus spp., Betula spp., Zelkova spp., Fraxinus spp., Pinus densiflora, Pinus koraiensis, and Pinus thunbergii ete. Genetic conservation in forest species in Korea there are three ways ; one is in situ, other is ex situ and third is in-facility conservation. In situ conservation include that are the present status of conservation of rare and endangered flora and ecosystem, the reserved forest, the national and provincial park, and the gene pool of natural forests. Ex situ conservation means to be established the new forest from in situ forest stands, progeny and provenance test populations, seed orchard and clone banks, and gene conservation in-facility. As a tool for low temperature storage, several aspects on in vitro system were studied ; (1) establishment of in vitro cultures from juvenile and/or rejuvenated tissues, (2) induction of multiple shoots from the individual micropropagules, (3) elongation of the proliferated shoots. Studies on cold storage for short-and long-term maintenance of in vitro cultures under $4^{\circ}C$ in the refrigerator were conducted. For the cryopreservation at $-196^{\circ}C$, various factors affecting survivability of the plant materials are being examined. The necessity of gene conservation of forest trees is enlarged not only to increase the adaptability for various environments but also to gain the breeding materials in the future. For effective gene conservation of forest trees, I would like to suggest followings ; 1. Forest stands reserved for other than the gene conservation purposes such as national parks should be investigated by botanical and gene-ecological studies for selecting bio-diversity and gene conservation stands. 2. Reserved forest for gene pool should be extented both economically important tree spp. and non-economical species. 3. Reserved forest for progeny test and clone bank should be systematically investigated for the use of Ex situ forest gene conservation. 4. We have to find out a new methodology of genetic analysis determining the proper and effective size of subpopulation for in situ gene conservation. 5. We should develop a new tree breeding systems for successful gene conservation and utilization of the genetic resources. 6. New method of in-facility gene conservation using advanced genetic engineering should be developed to save time and economic resources. 7. For the conservation of species with short-life span of seed or shortage of knowledge of seed physiology, tissue culture techniques will be played a great role for gene conservation of those species. 8. It is are very useful conservation not only of genes but of genotypes which were selected already by breeding program. 9. Institutional and administrative arrangements including legistlation must be necessarily taken for gene conservation of forest trees. 10. It is national problems for conservation of forest resources which have been rapidly destroyed because of degenerating environmental condition and of inexperienced management system of bio-diversity and gene conservation. 11. In order to international cooperation for exchanging data of bio-diversity and gene conservation, we should connect to international net works as soon as possible.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

A Study on e-B/L Korea Service and its Facilitation Strategies (한국형 전자선하증권 활성화 전략에 관한 연구)

  • Jeong, Yoon-Say
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.51-79
    • /
    • 2011
  • Korea has accomplished the establishment of the National Single Window for Paperless Trade. Since 1991, it has developed Trade Automation Service System based on EDI technology. In 2003, Korean government and private sectors jointly began to set up National Paperless Trade Service( e-Trade Service) as one of the e-government projects. In 2008, they commenced the uTradeHub Service which was equipped with Internet based e-B/L and e-Nego service systems for the first time in the world To facilitate the service Korea amended its e-Trade facilitation Act and Law by 2007. At the end of 2011, Korea historically recorded its trade volume of 1 trillion US dollars and joined '$1 trillion trade club' as the 9the member country since the country had started international trade less than five decades ago. A rolling out of the e-B/L and e-Nego service will 'ally reduce the transaction costs of trading businesses and accelerate the activation e-trade services. The purposes of the study are to examine 'e-B/L Korea' service and its facilitation strategies as well as identify obstacles to utilize the 'e-B/L Korea' service. The paper reviewed and analyzed Korea's Paperless trade system and distinctive characteristics of the 'e-B/L Korea Service. Parts of the fOWld distinctive characteristics of the Korea's e-B/L service are as follows; It is well equiped with IT and legal system. It also has more that 30,000 potential users who are already uTradeHub service users. The paper indicated several weaknesses of the current system such as global KPI issues, circulation of the electronic documents not only in the domestic market but also among economies, development of the electronic Bill of Exchange. As resolution measures, the paper recommended the introduction of mutual recognition system of PKI among trade partner counties, setting up e-trade solution for small and medium companies, and special attention to raise users' awareness of the e-B/L service.

  • PDF

e-Navigation 관련 산업현황에 관한 기초연구

  • Choe, Han-Gyu;Gang, Byeong-Jae
    • 선박안전기술공단연구보고서
    • /
    • s.4
    • /
    • pp.1-108
    • /
    • 2007
  • 2007. 7. 23 IMO의 NAV(항해안전전문위원회)53차 회의에서는 e-Navigation을 해상에서의 안전, 보안, 해양환경보호를 목적으로 전자적인 수단에 의해 선박과 육상에서 해양정보를 수집, 교환, 표시함으로써 항구와 항구간의 항해 및 관련된 서비스를 향상시키는 것으로 정의하고 있다.2005년 11월 영국의 교통부 장관 Stephen 박사는 Royal Institute ofNavigation에서의 연설에서 해상안전과 환경보호를 위하여 선박의 항해를 감시하는 관제소 및 항행하는 선박에 유용하고 정확한 정보가 더 많이 필요함을 역설하였다. 그리고 첨단 기술에 의해 자동화된 항공 항법분야를 예로들면서, 선박의 항법 분야도 항해와 관련된 모든 시설 및 작업을 전자적 수단으로 대체하는 개념인 e-Navigation으로 전환되어야 하며 영국은 이에 필요한 작업을 주도하겠다는 의견을 피력하였다. Stephen은 e-Navigation 도입으로 얻을 수 있는 이익으로 첫째, 항해 실수로 인한 사고 확률저감, 둘째,사고 발생 시 인명 구조 및 피해 확산을 위한 효율적 대응, 셋째, 전통적인항해시설 설치 불필요로 인한 비용 저감, 넷째 선박입출항 수속의 간편화 및항로의 효율적 운용으로 인한 상업적 이익 등을 들었다. 반면에e-Navigation 체계로 전환 시 예상되는 장애로는 첫째, 체계 구축을 위한 비용(특히 개발도상국가들의 경우 어려움 예상), 둘째, e-Navigation의 성과 달성을 위하여 세계 전 해역의 모든 선박이 e-Navigation 체계에 동참하도록유도하는 문제, 셋째, 전자해도 표시 및 선교 장비들에 대한 표준화 문제, 넷째, 육상에 설치할 e-Navigation 센터의 설계 및 구축 등을 꼽았다.IMO는 2005년 81차 MSC(해사안전위원회) 회의에서 영국이 일본, 마샬아일랜드, 네덜란드, 노르웨이, 싱가포르, 미국과 공동으로 제안한 ‘e-Navigation전략 개발’ 의제를 2006년 82차 MSC 회의에서 채택하고, NAV(항해 전문위원회)를 통하여 2008년까지 e-Navigation의 구체적 개념을 정립하고 향후 개발하여야 할 전략적 비전과 정책을 수립하기로 하였다. 이어서 영국을 의장으로 e-Navigation 전략개발 통신작업반이 구성되었는데, 지난 년간 19개국, 16개 전문기관이 참여하여 아래의 작업이 수행되었다. ○ e-Navigation 개념의 정의와 목적 ○ e-Navigation에 대한 핵심 이슈 및 우선 순위 식별 ○ e-Navigation 개발에 따른 이점과 단점의 식별 ○ IMO 및 회원국 등의 역할 식별 ○ 이행계획을 포함한 추가 개발을 위한 작업계획의 작성 IMO에서 수행되고 있는 e-Navigation 전략 개발 의제 일정은 2008년까지이다. 이 전략 개발에 있어서 중요한 요소는 e-Navigation이 포함할 서비스범위, 포함하는 서비스 제공에 필요한 인프라 및 장비의 식별, 인프라 구축및 운용비용을 부담할 주체에 대한 논의, e-Navigation으로 인한 이익과 투자비용에 대한 비교 분석 등이다. 이 과정에서 정부, 선주, 항만운영자, 선원등의 입장 차이와 선진국과 개발도상국 간의 경제 수준 차이는 전략 개발에있어 큰 어려움을 줄 것이므로, 이들이 합의된 전략을 만들기 위해서는 예정된 기간보다 다소 늦어질 가능성도 있다.e-Navigation 전략 개발이 완료되면 1단계로는 해상교통 관제시스템, 선박선교 장비, 무선 통신장비 등에 대한 표준화 작업이 이루어질 것이다. 이 과정에서 각국 간에 자국 보유 기술을 표준화시키기 위한 경쟁이 치열할 것으로 예상된다. 2단계에서는 e-Navigation 체계 하에서의 다양하고 풍부한 서비스 제공을 위한 관련 소프트웨어 및 하드웨어의 개발이 이루어질 것으로전망되는데, 이는 지난 10년간 육상에서 인터넷망 설치 후 이루어진 관련 서비스 산업의 발전을 돌아보면 쉽게 짐작할 수 있을 것이다.e-Navigation 체계 하에서 선박의 항해는 현재와는 전혀 다른 패러다임으로 바뀔 것이다. 예를 들어 현재 입출항 시 요구되던 복잡한 절차는one-stop 쇼핑 형태로 단순화되고, 현재 선박 중심의 항해에서 육상e-Navigation 센터가 적극적으로 관여하는 항해 체계로 바뀔 것이며, 해상정보의 공유와 활용이 무선 인터넷을 통해 보다 광범위하게 이루어질 것이 다.e-Navigation의 잠재적 시장 규모는 선박에 새로이 탑재될 지능형 통합 항법시스템 구축과 육상 모니터링 및 지원 시스템 등 직접 시장이 약 50조원,전자해도, 통신장비, 관련 서비스 컨텐츠 등 간접 시장의 규모가 150조원으로 총 200조원으로 대략 추산하고 있다. 향후 이 거대한 시장을 차지하기 위한 전략 수립이 필요한 시점이다. 지금까지 항해 장비 관련 산업은 선진국의일부 업체들에 의해 독점되어 왔다. 우리나라는 조선과 해운에서 모두 선진국임에도 불구하고 이 분야에서는 대부분 수입에 의존해 왔다. e-Navigation체계 하에서는 전체 시장이 커지고 장비의 사양이 표준화됨에 따라 어느 소수 업체가 현재처럼 독점하기는 더 이상 어려울 것으로 예상된다. 따라서e-Navigation은 우리나라도 항해 장비 분야 시장을 차지할 수 있는 좋은 기회라고 할 수 있다. 특히 조선 1위의 장점을 적극 활용한다면 다른 나라보다우위의 경쟁력을 확보할 수도 있다. 또한, 서비스 분야의 시장은 IT 기술과밀접한 관계가 있으므로 IT 강국인 우리나라가 충분한 경쟁력을 갖고 있다고 할 수 있다.그러나, EU를 비롯한 선진국에서는 이미 e-Navigation 에 대비한 연구를10여년 전부터 수행해 왔다. 앞에서 언급한 EU의 MarNIS 사업은 현재 거의마무리 단계로 당장 실용화 할 수 있는 수준에 있는 것으로 보인다. 늦었지만 우리도 이를 따라잡기 위한 연구를 서둘러야 할 것이다. 국내에서도e-Navigation의 중요성을 깊이 인식하고, 2006년에는 관련 산학연 전문가들로 작업반을 구성하여 워크숍 등을 개최한 바 있다. 또한 해양수산부에서도e-Navigation 핵심기술 개발을 위한 연구사업을 기획 추진하고 있다.그러나 현재 항해통신장비들의 기술기준은 ITU의 전파규칙(RR)과 IMO결의 및 SOLAS 협약을 따르고 있는데 이들 규약이나 결의에 대한 국제적인 추이와 비교할 때 국내의 기술은 표준화되지 못한 부분이 많은 실정이다.본 연구에서는 e-Navigation sytem중 표준화가 필요한 요소와 전자해도,AIS 등 e-Navigation(통합전자항법시스템)관련 국내산업현황 실태조사를 통해 국내 e-Navigation기술개발 동향에 대해 조사하고자 한다.

  • PDF

The Evaluation of Physical Environmental Factors in Urban Parks for Healthy City - Focus on Seoul - (건강증진을 위한 도시공원의 물리적 환경요소 평가 - 서울시를 대상으로 -)

  • Chae, Jin-Hae;Kim, Won-Ju
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.4
    • /
    • pp.29-40
    • /
    • 2020
  • This study quantitatively and qualitatively analyzes the physical environment for health promotion in urban parks by indicators that were selected in consideration of overseas cases and previous studies. To evenly distribute the areas to be evaluated by region, Seodaemun Independence Park, Hongneung Park, Gocheok Park, Sillim Park, Cheongdam Park, Gaepo Park, and Sungin Park were selected among the old neighborhood parks already established in Seoul. The evaluation indicators consist of quantitative indicators (12 factors classified into the three categories of the surrounding environment, the park characteristics, and the park facilities) and qualitative indicators (14 factors classified according to the five categories of accessibility, safety, convenience, activities, and amenities). These indicators were selected after conducting advisory meetings with experts in the field. The physical environment perception factors were evaluated by experts and investigators by field inspections and were rated on a three-point scale (high, medium, low). According to the results of the analysis, first, not only were exercise facilities and trails, but also various factors which support health activities, such as rest areas, leisure spots, and cultural facilities, as well as accessibility, cleanliness, and drinking water facilities are important indicators for health promotion. Second, even if the requirements are met for quantitative factors, several inconveniences hinder the actual implementation or use in the qualitative evaluation. Thus, both quantitative and qualitative evaluations must be simultaneously performed for the proper judging of the physical environment of a park. Third, upon conducting a qualitative evaluation of the physical environmental factors, score differences depended on the evaluated categories in each park. These differences show that indirect indicators, such as accessibility, safety, and facility convenience are insufficiently equipped compared to direct indicators, such as activity, which includes exercise facilities and fitness centers for health promotion. As the utilization rate of parks is increasing due to COVID-19, more efforts should be made to improve park services in the post-corona era. To promote such services, it is necessary to regularly evaluate parks based on both quantitative and qualitative indicators and to contemplate services not only through direct factors but also indirect factors and security measures.

Object Tracking Based on Exactly Reweighted Online Total-Error-Rate Minimization (정확히 재가중되는 온라인 전체 에러율 최소화 기반의 객체 추적)

  • JANG, Se-In;PARK, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2019
  • Object tracking is one of important steps to achieve video-based surveillance systems. Object tracking is considered as an essential task similar to object detection and recognition. In order to perform object tracking, various machine learning methods (e.g., least-squares, perceptron and support vector machine) can be applied for different designs of tracking systems. In general, generative methods (e.g., principal component analysis) were utilized due to its simplicity and effectiveness. However, the generative methods were only focused on modeling the target object. Due to this limitation, discriminative methods (e.g., binary classification) were adopted to distinguish the target object and the background. Among the machine learning methods for binary classification, total error rate minimization can be used as one of successful machine learning methods for binary classification. The total error rate minimization can achieve a global minimum due to a quadratic approximation to a step function while other methods (e.g., support vector machine) seek local minima using nonlinear functions (e.g., hinge loss function). Due to this quadratic approximation, the total error rate minimization could obtain appropriate properties in solving optimization problems for binary classification. However, this total error rate minimization was based on a batch mode setting. The batch mode setting can be limited to several applications under offline learning. Due to limited computing resources, offline learning could not handle large scale data sets. Compared to offline learning, online learning can update its solution without storing all training samples in learning process. Due to increment of large scale data sets, online learning becomes one of essential properties for various applications. Since object tracking needs to handle data samples in real time, online learning based total error rate minimization methods are necessary to efficiently address object tracking problems. Due to the need of the online learning, an online learning based total error rate minimization method was developed. However, an approximately reweighted technique was developed. Although the approximation technique is utilized, this online version of the total error rate minimization could achieve good performances in biometric applications. However, this method is assumed that the total error rate minimization can be asymptotically achieved when only the number of training samples is infinite. Although there is the assumption to achieve the total error rate minimization, the approximation issue can continuously accumulate learning errors according to increment of training samples. Due to this reason, the approximated online learning solution can then lead a wrong solution. The wrong solution can make significant errors when it is applied to surveillance systems. In this paper, we propose an exactly reweighted technique to recursively update the solution of the total error rate minimization in online learning manner. Compared to the approximately reweighted online total error rate minimization, an exactly reweighted online total error rate minimization is achieved. The proposed exact online learning method based on the total error rate minimization is then applied to object tracking problems. In our object tracking system, particle filtering is adopted. In particle filtering, our observation model is consisted of both generative and discriminative methods to leverage the advantages between generative and discriminative properties. In our experiments, our proposed object tracking system achieves promising performances on 8 public video sequences over competing object tracking systems. The paired t-test is also reported to evaluate its quality of the results. Our proposed online learning method can be extended under the deep learning architecture which can cover the shallow and deep networks. Moreover, online learning methods, that need the exact reweighting process, can use our proposed reweighting technique. In addition to object tracking, the proposed online learning method can be easily applied to object detection and recognition. Therefore, our proposed methods can contribute to online learning community and object tracking, detection and recognition communities.