• Title/Summary/Keyword: 실시간추적

Search Result 1,564, Processing Time 0.037 seconds

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

A Study on Tangible Gesture Interface Prototype Development of the Quiz Game (퀴즈게임의 체감형 제스처 인터페이스 프로토타입 개발)

  • Ahn, Jung-Ho;Ko, Jae-Pil
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.235-245
    • /
    • 2012
  • This paper introduce a quiz game contents based on gesture interface. We analyzed the off-line quiz games, extracted its presiding components, and digitalized them so that the proposed game contents is able to substitute for the off-line quiz games. We used the Kinect camera to obtain the depth images and performed the preprocessing including vertical human segmentation, head detection and tracking and hand detection, and gesture recognition for hand-up, hand vertical movement, fist shape, pass and fist-and-attraction. Especially, we defined the interface gestures designed as a metaphor for natural gestures in real world so that users are able to feel abstract concept of movement, selection and confirmation tangibly. Compared to our previous work, we added the card compensation process for completeness, improved the vertical hand movement and the fist shape recognition methods for the example selection and presented an organized test to measure the recognition performance. The implemented quiz application program was tested in real time and showed very satisfactory gesture recognition results.

Development of AVL-GIS System Using IDGPS and Wireless Communication Techniques (IDGPS 와 무선통신을 이용한 AVL-GIS 시스템개발)

  • 안충현;양종윤;최종현
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.209-221
    • /
    • 1999
  • In this research, AVL-GIS(Automatic Vehicle Location System linked with Geographic Information System) system was developed using integration of core techniques of GIS engine written by Java language, GOS(Global Positioning System) and wireless telecommunication interfacing techniques. IDGPS(Inverted differential GPS) techniques was employed to estimate accurate position of mobile vehicle and to supervise their path from AVL-GLS control center system. Between mobile vehicle and AVL-GLS control center system which has spatial data analysis function, road network and rleate ddata base were connected wireless phone to communicate for position an dmessage in real time. The developed system from this research has more enhanced GIS functions rather than previous AVL oriented system which has MDT for message display and voice communication only. This system can support build-up application system such as fleet management like bus, taxi, truck, disaster and emergency and monitoring of transportation status for customer s order via web browser in filed of EC/CALS in low cost.

  • PDF

Verification of Automatic PAR Control System using DEVS Formalism (DEVS 형식론을 이용한 공항 PAR 관제 시스템 자동화 방안 검증)

  • Sung, Chang-ho;Koo, Jung;Kim, Tag-Gon;Kim, Ki-Hyung
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2012
  • This paper proposes automatic precision approach radar (PAR) control system using digital signal to increase the safety of aircraft, and discrete event systems specification (DEVS) methodology is utilized to verify the proposed system. Traditionally, a landing aircraft is controlled by the human voice of a final approach controller. However, the voice information can be missed during transmission, and pilots may also act improperly because of incorrectness of auditory signals. The proposed system enables the stable operation of the aircraft, regardless of the pilot's capability. Communicating DEVS (C-DEVS) is used to analyze and verify the behavior of the proposed system. A composed C-DEVS atomic model has overall composed discrete state sets of models, and the state sequence acquired through full state search is utilized to verify the safeness and the liveness of a system behavior. The C-DEVS model of the proposed system shows the same behavior with the traditional PAR control system.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Stereo Convergence Angle Disparity Extraction of the Moving Target using Optical JTC (광 JTC를 이용한 이동 물체의 스테레오 주시각 시차 추출)

  • 이재수;김성호;김규태;김은수;박순영;이용범
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.35D no.12
    • /
    • pp.99-107
    • /
    • 1998
  • A stereo vision system such as the structure of human's eyes has two cameras at separated positions from which we can obtain two input images and then put them together to create 3-D image. It can show more virtual effect than the conventional 2-D image system. But, the stereo image system has to control the convergence angle so that the stereo disparity could always be zero because observers can be fatigued and unconscious of stereo image in conditions that the stereo disparity is not zero for a long work. Therefore, in the paper, optical JTC system which can process adaptive tracking of a specific moving object is proposed as a new approach to keep the stereo disparity to be zero. In this method, optical JTC system obtains the values of the relative locations of a moving objects in left and right images and then these values are used for maintaining the stereo disparity to be zero. Through some optical experiments the proposed stereo vision system is proved to be insensitive to background noises and operate in real-time.

  • PDF

The Design of the Container Logistics Information System Reflects the Port Logistics Environment (항만물류 특성을 반영한 컨테이너 정보시스템 설계)

  • Park, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.159-167
    • /
    • 2015
  • The nature of port logistics requires global visibility and traceability. However, the traditional RFID technology still applied cannot meet these demands. IP-USN and M2M in port logistics have faced challenges of the prerequisite of network composition and immense communications at the base where a grand number of containers are installed. To resolve the issue, this study suggests an IP-RFID-based smart port logistics service platform. The IP-RFID-based port logistics service system resolved the communication problem by separating the RFID tag and AP, which allows internet connection, from the tag. The tags connected with thermo-sensors, humidity sensors, pressure sensors, GPS, etc. are attached to the containers insuring global visibility and traceability, key factors in logistics, by obtaining desired real-time information regardless of time and location.

Design and Performance Analysis of Real-Time Hybrid Position Tracking Service System using IEEE 802.15.4/4a in the Multi-Floor Building (복합환경에서 IEEE 802.15.4/4a를 이용한 하이브리드 실시간 위치추적 서비스 시스템 설계 및 성능분석)

  • Kim, Myung-Hwan;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.105-116
    • /
    • 2011
  • With recent spotlight on the, uniquitous computing technology, the need for object of indentification and location infrastructure has increased. Such GPS technolgy must utilize IEEE 802.15.4 Zigbee used for existing wireless sensor network infra as a basice element for user's context-awareness in a uniquitous environement, for effectiveness.Such real-time GPS service is provided in the internal environment where the user would actually are and most high-rise buildlings apply. Underthe assumption, the real-time GPS technology is seperated by each floor, and signals do not get transmitted to other floors, the application on one floor within the high-rise buildling was conducted. This study intends to suggest a floor detection algorithm using IEE 802.15.3/Zigbee's RSSI which supports the accuracy within a couple of meters for the user's the movement between the floors in high-rise buildings in a complex environment. It proposes an floor detection algorithm using IEEE 802.15.4/Zigbee's RSSI which provides accuracy within a radius of few meters for the users movement between the floors for real-time location tracking within high-rise building in a cmoplex environment. Furthermore, for more accurate real-time location tracking, it suggests an algorithm for real-time location tracking using IEEE 802.15.4a/Zigbee's CSS technology based on triangulation. Based on the suggested algorithm, it designs a hybrid real-time location tracking service system in a high-rise buildling and test its functions.

A Study on Quantitative methodology to Assess Cyber Security Risks of EMS (스마트그리드 체제에 따른 EMS의 보안 평가를 위한 정량적 방법론에 관한 연구)

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Energy Engineering
    • /
    • v.24 no.1
    • /
    • pp.123-131
    • /
    • 2015
  • This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The EMS and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. In this study, the optimal power flow(OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.