• Title/Summary/Keyword: 실시간추적

Search Result 1,564, Processing Time 0.046 seconds

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.

Target Separation using Wavelet for Multiple Target Localization in Wireless Sensor Network (다중 표적 위치 추정을 위한 무선 센서 네트워크에서 웨이블릿을 이용한 표적 분리)

  • Cha, Dae-Hyun;Lee, Tae-Young;Hong, Jin-Keun;Han, Kun-Hui;Hwang, Chan-Sik
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.295-298
    • /
    • 2009
  • 다중 표적을 감시하는 무선 센서 네트워크에서 다중 표적이 서로 교차하게 될 때 각각의 표적을 분리하는 문제는 표적의 추적, 탐지, 식별 등의 분야에서 매우 중요하다. 기존의 무선 센서 네트워크에서는 에너지 기반의 기법을 사용하기 때문에 다중 표적의 위치를 추정할 수 없거나, 기지국에서의 원 신호 분석 방법을 통해 표적의 종류를 식별하여 각각의 표적을 분리한다. 후자의 방법은 무선 센서 노드의 통신량과 연산량을 증가시켜 센서 노드의 생존 시간이 짧아지는 단점이 있고, 표적 분리까지 걸리는 시간으로 인해 실시간 처리가 어렵다. 본 논문에서는 무선 센서 노드에서 웨이블릿 변환을 이용한 특징을 추출하고 이를 이용해 다중 표적이 센서 영역 내에서 교차하게 될 때 표적을 분리하는 방법을 제안한다. 제안된 방법은 웨이블릿 상수의 주파수 정보를 이용하여 적은 연산으로 표적을 분리한다.

  • PDF

Mobile Reader Selection for Improving Precision of Location Estimation in RTLS (위치 측정 정확도 향상을 위한 RTLS의 이동형 리더 선택)

  • Kim, Jam-Je;Son, Sang-Hyun;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.45-49
    • /
    • 2010
  • RTLS (Real Time Locating Systems) are used to track and identify the location of objects in real time. RTLS generally consist of tags, readers and engine etc. and applied in various environments. One problem encountered in RTLS is constraints for setting up readers according to environments. In these challenging environments, it is necessary to develop techniques that can use mobile readers. As mobile reader increase, whole reader increase. And it is necessary to develop technique that can select useful readers. Selected readers including mobile readers take effect performance of RTLS. This paper introduces the technique for selecting good readers using the convex hull algorithm. The result show the good performance which based on tag's location error and reduce the networking overhead.

Design of Surveillance System for Fishery Safety and Security Using F-AIS (F-AIS를 이용한 어장보호 시스템 설계)

  • Yim Jeong-Bin;Nam Taek-Keun;Jeong Jung-Sik;Park Seong-Hyen;Yang Weon-Jae
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.71-74
    • /
    • 2005
  • This paper describes Fishery Safety and Security System using F-AIS based on the concepts of RFID(Radio Frequency Identification). This system is to track, protect and arrest the thief who invaded in an fishing ground. The system composed with various functional modules to implement selectively available system providing low cost to high cost and simple function to high function according to user's requirement in a practical fishing fields. Sea trial tests are carried out at Mokpo, Busan and Incheon and, it is found that the system can guard the wide area of cultivating farm field.

  • PDF

Robust Real-time Tracking of Facial Features with Application to Emotion Recognition (안정적인 실시간 얼굴 특징점 추적과 감정인식 응용)

  • Ahn, Byungtae;Kim, Eung-Hee;Sohn, Jin-Hun;Kweon, In So
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.4
    • /
    • pp.266-272
    • /
    • 2013
  • Facial feature extraction and tracking are essential steps in human-robot-interaction (HRI) field such as face recognition, gaze estimation, and emotion recognition. Active shape model (ASM) is one of the successful generative models that extract the facial features. However, applying only ASM is not adequate for modeling a face in actual applications, because positions of facial features are unstably extracted due to limitation of the number of iterations in the ASM fitting algorithm. The unaccurate positions of facial features decrease the performance of the emotion recognition. In this paper, we propose real-time facial feature extraction and tracking framework using ASM and LK optical flow for emotion recognition. LK optical flow is desirable to estimate time-varying geometric parameters in sequential face images. In addition, we introduce a straightforward method to avoid tracking failure caused by partial occlusions that can be a serious problem for tracking based algorithm. Emotion recognition experiments with k-NN and SVM classifier shows over 95% classification accuracy for three emotions: "joy", "anger", and "disgust".

Anomaly Detection of IGS Predicted Orbits for Near-Real-Time Positioning Using GPS (GPS기반 준실시간 위치추적을 위한 IGS 예측궤도력 이상 검출)

  • Ha, Ji-Hyun;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.953-961
    • /
    • 2011
  • IGS (International GNSS Service) predicted orbits contained in IGS ultra-rapid orbits is suitable for real-time or near-real-time precise positioning. In this paper, we analyzed orbit anomalies of the IGS predicted orbits and detected the anomalies NANU (Current Notice Advisories to NAVSTAR Users) messages and IGS BRDC (Broadcast Ephemerides). As a results, the orbit anomalies of the predicted orbits were observed 93 times in 2010. In case of using the NANUs, we could get detection performance of 88% about the IGS predicted orbits's anomalies. And we could achieve 95% detection performance when the NANUs and BRDCs were used together.

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

A Study on the Facal motion and for Detection of area Using Kalman Fillter algorithm (Facal motion 예측 및 영역 검출을 위한 칼만 필터 알고리즘)

  • Seok, Gyeong-Hyu;Park, Bu-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.973-980
    • /
    • 2011
  • In this paper, we gaze upon the movement faces the problem points are difficult to identify a user based on points and that corrective action is needed to solve the identification system is proposed a new eye. Kalman filter, the current head of the location information was used to estimate the future position in order to determine the authenticity of the face facial features and structural elements, the information and the processing time is relatively fast horizontal and vertical elements of the face using the histogram analysis to detect. And an infrared illuminator obtained by constructing a bright pupil effect in real-time detection of the pupil, the pupil was tracked - geulrinteu vectors are extracted.

A Clustering Technique of Radar Signals using 4-Dimensional Features (4차원 특징 벡터에 의한 레이더 신호 클러스터링 기법)

  • Lee, Jong-Tae;Ju, Young-Kwan;Kim, Gwan-Tae;Jeon, Joong-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.137-144
    • /
    • 2014
  • The Electronic Support System collects and analyzes the received radar signals in order to cope with the electronic attack in real-time. The radar-pulse clustering system classifies the radar signals that are considered to be emitted by a single source. This paper proposed a radar-pulse clustering algorithm based on four kinds of features: the direction, frequency, pulse width, and the difference of arrival time between two successive pulses. The experiment results show that the proposing algorithm could trace the moving emitter and classify the timely separated signals into different classes.