• Title/Summary/Keyword: 융합제거

Search Result 640, Processing Time 0.032 seconds

Analysis of Computer Virus Immune System (바이러스 면역시스템 분석)

  • 전완근;이중식;이종일;김홍윤
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.39-47
    • /
    • 2002
  • To recently with the love-letter and Back Orifice the same Worm-virus, with the Trojan and the Linux-virus back against the new species virus which inside and outside of the country to increase tendency the malignant new species virus which is the possibility of decreasing the damage which is enormous in the object appears and to follow a same network coat large scale PC is being quicker, it disposes spontaneously to respect, applied an artificial intelligence technique the research against the next generation malignant computer virus of new form is demanded. Will reach and to respect it analyzes the digital immunity system of the automatic detection which is quick against the next generation malignant virus which had become unconfirmed and the foreign countries which has an removal function.

  • PDF

The Comparative Study of Software Optimal Release Time of Finite NHPP Model Considering Log Linear Learning Factor (로그선형 학습요인을 이용한 유한고장 NHPP모형에 근거한 소프트웨어 최적방출시기 비교 연구)

  • Cheul, Kim Hee;Cheul, Shin Hyun
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.3-10
    • /
    • 2012
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, finite failure non-homogeneous Poisson process model, considering learning factor, presented and propose release policies of the life distribution, log linear type model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, the parameters estimation using maximum likelihood estimation of failure time data, make out estimating software optimal release time.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

Crane Monitoring System for Moving Objects in Safety Lines (크레인 안전선 접근 이동 물체 감시 시스템)

  • Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.237-241
    • /
    • 2011
  • Stable operation of an industry crane becomes more important as current industry facilities become larger and operate at higher speeds. This paper proposes implementing a system for monitoring moving objects within safety lines of an industry crane by camera. The cost of implementing such a system is low, since it requires only a webcam and notebook computer. The detection algorithm of moving objects uses the feature extraction method by image differential histograms. The proposed system is robust to variations in the weather and environment. The area of the inside safety lines is considered and shadow removal algorithm is used for good performance of the system. The system is valuable for practical applications in the industry.

Performance Improvement of Speech Recognition Based on Independent Component Analysis (독립성분분석법을 이용한 음성인식기의 성능향상)

  • 김창근;한학용;허강인
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.285-288
    • /
    • 2001
  • In this paper, we proposed new method of speech feature extraction using ICA(Independent Component Analysis) which minimized the dependency and correlation among speech signals on purpose to separate each component in the speech signal. ICA removes the repeating of data after finding the axis direction which has the greatest variance in input dimension. We verified improvement of speech recognition ability with training and recognition experiments when ICA compared with conventional mel-cepstrum features using HMM. Also, we can see that ICA dealt with the situation of recognition ability decline that is caused by environmental noise.

  • PDF

A Study on the Removal Characteristics of Organic matter and Bacteria with the Use of Ozone (오존을 이용한 유기물 및 세균의 제거 특성에 관한 연구)

  • Lee, Kwan-Young;Park, Sang-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.10 no.1
    • /
    • pp.15-20
    • /
    • 2007
  • The aim of this study is to measure the removal characteristics of organic matter and bacteria with the use of ozone to reduce the problems caused by bacteria and organic matter which appear in sea-water is summer season. When the total input of ozone was $1.4mg/{\ell}O_3$, the removal rate of bacteria and E-coli from sea-water proved to be 100%. With the same input of ozone, on the other hand, the removal rate of COD turned to be relatively low, 50%, which was to the fact that sea-water consists of salt matter which is a kind of COD matter. This result supports the idea that we can keep using ozone steadily in the future to remove organic matters and bacteria from sea-water because ozone destructs relatively less salt matter in sea-water. Also, the treatment effect rate of SS, turbidity and organic matters such as $NH_3$-N, $NO_3$-N etc, was very high. As a result, we assume that the treatment of organic matter in sea-water with ozone is very effective

  • PDF

Teeth Image Recognition Using Hidden Markov Model (HMM을 이용한 치열 영상인식)

  • Kim, Dong-Ju;Yoon, Jun-Ho;Cheon, Byeong-Geun;Lee, Hyon-Gu;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2006.06a
    • /
    • pp.29-32
    • /
    • 2006
  • 본 논문에서는 기존의 생체인식에서 사용하지 않았던 방법으로 개인의 치열 영상을 이용하는 생체 인식 방법을 제안한다. 제안한 치열 인식 시스템은 데이터의 중복성 제거와 관측벡터의 차원 감소를 위하여 2D-DCT를 특징 파라미터로 사용하고, 음성인식 및 얼굴인식 분야에서 사용하는 EHMM 기술을 사용한다. EHMM은 3개의 super-state로 구성되며 각각의 super-state는 3개, 5개, 3개의 상태를 갖는 1D-HMM으로 구성된다. 치열인증 시스템의 성능 평가는 모델 훈련에 사용하지 않은 치열 영상으로 인식 실험하여 평가한다. 치열인식 실험에는 남자 10명과 여자 10명에 대하여 각각 10개의 이미지로 구성된 총 200개의 치열 영상을 사용한다. 치열인식 실험에서 제안한 치열인식 시스템의 인식률은 98.5%를 보였고, 참고문헌 [4]의 EHMM을 사용한 얼굴인식 시스템이 갖는 98%와 대등한 성능을 나타내는 것을 확인하였다.

  • PDF

Image Scale Prediction Using Key-point Clusters on Multi-scale Image Space (다중 스케일 영상 공간에서 특징점 클러스터를 이용한 영상스케일 예측)

  • Ryu, kwon-Yeal
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.1
    • /
    • pp.1-6
    • /
    • 2018
  • In this paper, we propose the method to eliminate repetitive processes for key-point detection on multi-scale image space. The proposed method detects key-points from the original image, and select a good key-points using the cluster filters, and create the key-point clusters. And it select reference objects by using direction angles of the key-point clusters, predict the scale of the original image by using the distributed distance ratio. It transform the scale of the reference image, and apply the detection of key-points to the transformed reference image. In the results of the experiment, the proposed method can be found to improve the key-points detection time by 75 % and 71 % compared to SIFT method and scaled ORB method using the multi-scale images.

Performance Comparison of Space Time block coded Frequency Domain Equalization transmission Scheme in Underwater Acoustic Communication Channel (수중음향 통신채널 환경에서 시공간 블록부호를 적용한 주파수영역 등화기법의 성능평가)

  • Hwang, Hoseon;Lee, Seokwoo;Kang, Yeongsik;Choi, Jaehoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.177-185
    • /
    • 2019
  • In this paper, we propose and evaluate a FDE combined with STBC transmission structure to cancellation of ISI in underwater acoustic communication. To achieve this purpose, underwater acoustic channels are modeled and the simulation results are presented. In case of STBC-FDE, the transmission rate is less about 4% than STBC-OFDM, but the SER performance is better than STBC-OFDM that is larger from 4.4% to 16.8% at the SNR of 15dB than STBC-OFDM.

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF