• Title/Summary/Keyword: 추적방안

Search Result 608, Processing Time 0.03 seconds

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

A longitudinal study of the stress factors of parents between psychological maladjustment and the risk of school interruption in multicultural adolescents: The Application of Autoregressive Cross-lagged Model (부모의 스트레스와 다문화청소년의 심리적 부적응, 학업중단위험 간 종단적 인과관계: 자기회귀교차지연모형 적용)

  • Lee, Hyoung-Ha
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.373-385
    • /
    • 2021
  • In this study, the Korea Youth Policy Institute applied a self-registering model to verify the patterns of parental stress, multicultural youth psychological maladjustment, and interdependence between three factors by using five-point-time data tracked from middle school to high school. According to the analysis, First, Parent' stress at the time of the five surveys had a significant positive effect on the psychological maladjustment and the risk of academic interruption of multicultural adolescents at that point. Second, the psychological maladaptation of multicultural adolescents at the time of the previous five surveys had a significant positive effect on the risk of academic interruption at that point. Based on these analysis results, various support measures were proposed to cope with the stress of multicultural youth parents, and policy alternatives were proposed to prevent the risk of academic interruption by reducing the psychological maladjustment of multicultural youth.

Implementation of a Helmet Azimuth Tracking System in the Vehicle (이동체 내의 헬멧 방위각 추적 시스템 구현)

  • Lee, Ji-Hoon;Chung, Hae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.529-535
    • /
    • 2020
  • It is important to secure the driver's external field view in armored vehicles surrounded by iron armor for preparation for the enemy's firepower. For this purpose, a 360 degree rotatable surveillance camera is mounted on the vehicle. In this case, the key idea is to recognize the head of the driver wearing a helmet so that the external camera rotated in exactly the same direction. In this paper, we introduce a method that uses a MEMS-based AHRS sensor and a illuminance sensor to compensate for the disadvantages of the existing optical method and implements it with low cost. The key idea is to set the direction of the camera by using the difference between the Euler angles detected by two sensors mounted on the camera and the helmet, and to adjust the direction with illuminance sensor from time to time to remove the drift error of sensors. The implemented prototype will show the camera's direction matches exactly in driver's one.

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

Development of a Sign Language Learning Assistance System using Mediapipe for Sign Language Education of Deaf-Mutility (청각장애인의 수어 교육을 위한 MediaPipe 활용 수어 학습 보조 시스템 개발)

  • Kim, Jin-Young;Sim, Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1355-1362
    • /
    • 2021
  • Recently, not only congenital hearing impairment, but also the number of people with hearing impairment due to acquired factors is increasing. The environment in which sign language can be learned is poor. Therefore, this study intends to present a sign language (sign language number/sign language text) evaluation system as a sign language learning assistance tool for sign language learners. Therefore, in this paper, sign language is captured as an image using OpenCV and Convolutional Neural Network (CNN). In addition, we study a system that recognizes sign language behavior using MediaPipe, converts the meaning of sign language into text-type data, and provides it to users. Through this, self-directed learning is possible so that learners who learn sign language can judge whether they are correct dez. Therefore, we develop a sign language learning assistance system that helps us learn sign language. The purpose is to propose a sign language learning assistance system as a way to support sign language learning, the main language of communication for the hearing impaired.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

Construction of hydraulic flood prediction model for Nakdong river basin (낙동강 수계 수리학적 홍수예측 모형 구축)

  • Lee, Jae Yeong;Kim, Ji Sung;Kim, Tae Hyung;Choi, Kyu Hyun;Kim, Chang Sung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.394-394
    • /
    • 2020
  • 최근 빈번히 발생하고 있는 슈퍼 태풍과 집중호우로 인해 크고 작은 침수피해가 발생하고 있다. 우리나라는 4대강 사업을 통해 주요 국가하천에 대한 정비를 마친 바 있으나 이후 지속적으로 변화하는 하천 환경에 대한 홍수예측 모형의 반영은 미비한 실정이었다. 따라서 본 연구에서는 낙동강 본류 및 지류의 최신 단면자료를 수집하여 수리학적 홍수예측모형에 반영하고자 하였다. 또한, 기존의 모형에 비해 정확도를 개선할 수 있는 방안을 모색하여 적용성을 검증하고 이를 반영한 수리학적 홍수예측 모형을 제시하고자 한다. 본 연구에서는 낙동강 본류 및 주요 지류에 대한 최신 횡단면 측량자료를 활용하여 1차원 수리학적 홍수예측 모형을 구축하고 2012년 태풍 산바 사상에 대한 검보정을 실시하였다. 대상구간은 안동조정지댐으로부터 낙동강 하구둑 하류 8km지점이며, 상류단 경계조건은 안동조정지댐 방류량을 입력하고 하류단 경계조건은 가덕도 조위관측소의 조위를 활용하였다. 또한, 반변천, 내성천, 위천, 감천, 금호강, 황강, 남강 등 7개 지류에 대한 하도를 하도추적이 가능한 네트워크 모형으로 구축함으로써 지류에 대한 홍수예보에 활용할 수 있도록 하였다. 낙동강 본류의 하도 길이는 340km, 824개의 단면으로 구성하였으며, 지류를 포함한 전체 하도 길이는 572km, 1,570개의 단면으로 구성하였다. 또한, 낙동강 본류에 위치한 8개의 다기능보와 지류에 위치한 횡단구조물의 반영을 위해 다기능보의 제원 및 하천기본계획을 참고하여 내부경계조건으로 활용하였다. 본 연구에서 구축된 낙동강 본류 및 지류의 수리학적 홍수예측 모형을 낙동강 유역에 대한 홍수주의보 및 홍수경보 등 홍수특보 발령 업무에 활용함으로써 정확한 홍수예보가 가능하도록 하였다.

  • PDF

The Enhancement of intrusion detection reliability using Explainable Artificial Intelligence(XAI) (설명 가능한 인공지능(XAI)을 활용한 침입탐지 신뢰성 강화 방안)

  • Jung Il Ok;Choi Woo Bin;Kim Su Chul
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.101-110
    • /
    • 2022
  • As the cases of using artificial intelligence in various fields increase, attempts to solve various issues through artificial intelligence in the intrusion detection field are also increasing. However, the black box basis, which cannot explain or trace the reasons for the predicted results through machine learning, presents difficulties for security professionals who must use it. To solve this problem, research on explainable AI(XAI), which helps interpret and understand decisions in machine learning, is increasing in various fields. Therefore, in this paper, we propose an explanatory AI to enhance the reliability of machine learning-based intrusion detection prediction results. First, the intrusion detection model is implemented through XGBoost, and the description of the model is implemented using SHAP. And it provides reliability for security experts to make decisions by comparing and analyzing the existing feature importance and the results using SHAP. For this experiment, PKDD2007 dataset was used, and the association between existing feature importance and SHAP Value was analyzed, and it was verified that SHAP-based explainable AI was valid to give security experts the reliability of the prediction results of intrusion detection models.

Integrated Data Model of Topographic and Cadastral Information in LIS (토지정보체계에서 지형 및 지적 정보의 공동 활용에 관한 연구)

  • Lee, Suk Kun;Kim, Gab Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.541-547
    • /
    • 2006
  • With the new paradigm of ubiquitous in the developed computing technology, it is urgently necessary to research GIS fields centering around positioning techniques. The intention of this study is to propose implementation methods for integrating topographic and cadastral data. For this purpose an integrated data model is formed to coincide the graphic data of cadastral map with that of topographic map. As a result, the integrated data model could be built by harmonizing cadastral map with topographic map. We suggest data model for connecting with other information systems in the conditions of data uniformity and implementation. This data implementation models suggested in this research can provide a good reference for the future implementation of other systems. This results will be efficiently used as basis for practical use in ubiquitous environments of spatial informations.