• Title/Summary/Keyword: 추적자 모의

Search Result 207, Processing Time 0.027 seconds

An Implementation on the XOR-ACC of Multimedia Fingerprinting using Neural Network (신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.1-8
    • /
    • 2011
  • In multimedia fingerprinting field, it is many used a code based on BIBD, which has a strong resiliency of anti-collusion. When a collusion-attack code is generated with a logical XOR operation using the code based on BIBD, then some cases are occurred that a colluded code could be generated to the same fingerprint of non-colluder on the other hand, the colluder is decided to the non-colluder so that he would be excepted in the colluder tracing. For solving the serious problem of the wrong decision of the colluder tracing in this paper, XOR-ACC is implemented using multi-layer perceptron neural network among (AND, OR, XOR and Averaging)-ACC by the measured correlation coefficient. Through the experiment, it confirms that XOR-ACC efficiency of multimedia fingerprinting code{7,3,1} based on BIBD is improved to 88.24% from the conventional 41.18%, so that a ratio of the colluder tracing is also improved to 100% from the conventional 53%. As a result, it could be traced and decided completely a sectional colluder and non-colluder about the collusion attacks.

Implementation of Slaving Data Processing Function for Mission Control System in Space Center (우주센터 발사통제시스템의 추적연동정보 처리기능 구현)

  • Choi, Yong-Tae;Ra, Sung-Woong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.31-39
    • /
    • 2014
  • In KSLV-I launch mission, real-time data from the tracking stations are acquired, processed and distributed by the Mission Control System to the user group who needed to monitor processed data for safety and flight monitoring purposes. The processed trajectory data by the mission control system is sent to each tracking system for target designation in case of tracking failure. Also, the processed data are used for decision making for flight termination when anomalies occur during flight of the launch vehicle. In this paper, we propose the processing mechanism of slaving data which plays a key role of launch vehicle tracking mission. The best position data is selected by predefined logic and current status after every available position data are acquired and pre-processed. And, the slaving data is distributed to each tracking stations through time delay is compensated by extrapolation. For the accurate processing, operation timing of every procesing modules are triggered by time-tick signal(25ms period) which is driven from UTC(Universial Time Coordinates) time. To evaluate the proposed method, we compared slaving data to the position data which received by tracking radar. The experiments show the average difference value is below 0.01 degree.

A Study of Bitcoin Transaction Tracking Method through Illegal Community (불법 커뮤니티를 통한 비트코인 거래 추적 방법에 관한 연구)

  • Jeong, Sejin;Kwak, Nohyun;Kang, Brent Byunghoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.717-727
    • /
    • 2018
  • When illegal transactions are made with bitcoin, it's not easy to track all the bitcoins used in the transaction and seize them. Especially, if criminals distribute illegal transactions by spreading them to several bitcoin addresses, it's difficult to track hidden bitcoins other than confiscated bitcoins even if some bitcoins are confiscated. This paper proposes a method for tracking and monitoring all bitcoin transactions suspected of illegal transactions. This method estimates bitcoin addresses that are highly relevant to crime among all bitcoin addresses that dealing with the address based on the bitcoin address list of the alleged crime, and keeps track of addresses that are relevant to crime and help to investigate illegal bitcoin transaction.

Real-time Multi-Objects Recognition and Tracking Scheme (실시간 다중 객체 인식 및 추적 기법)

  • Kim, Dae-Hoon;Rho, Seung-Min;Hwang, Een-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.386-393
    • /
    • 2012
  • In this paper, we propose an efficient multi-object recognition and tracking scheme based on interest points of objects and their feature descriptors. To do that, we first define a set of object types of interest and collect their sample images. For sample images, we detect interest points and construct their feature descriptors using SURF. Next, we perform a statistical analysis of the local features to select representative points among them. Intuitively, the representative points of an object are the interest points that best characterize the object. in addition, we make the movement vectors of the interest points based on matching between their SURF descriptors and track the object using these vectors. Since our scheme treats all the objects independently, it can recognize and track multiple objects simultaneously. Through the experiments, we show that our proposed scheme can achieve reasonable performance.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

A Spreadsheet Application that Enables to Flexibly Change Mappings in Requirement Traceability Matrix (요구사항 추적성 매트릭스에서 유연한 맵핑 변경을 가능하게 하는 스프레드시트 애플리케이션)

  • Jeong, Serin;Lee, Seonah
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.9
    • /
    • pp.325-334
    • /
    • 2018
  • Requirement traceability should be continuously maintained in software development and evolution. However, it is usually updated in practice in the quality assurance phase. The gap between "is" and "should" exists due to the fact that developers must invest considerable effort to update requirement traceability while being able to obtain only marginal benefit from the updated traceability. To close this gap, we propose a spreadsheet application that enables developers to flexibly change mappings in a requirement traceability matrix. In this way, developers can reduce their effort in updating the requirement traceability matrix, but still obtain the common form of a requirement traceability matrix on a spreadsheet. The proposed application maintains the mappings between two artifacts on each sheet so that, whenever an artifact item changes, developers can instantly insert the relevant mapping changes. Then, when developers desire the common form of a requirement traceability matrix, the proposed application calculates the mappings among several artifacts and creates the matrix. The application also checks traceability errors and calculates the metrics so that developers can understand the completeness of the matrix. To understand the applicability of the proposed approach, we conducted a case study, which shows that the proposed application can be applied to the real project and easily incorporate the mapping changes.

Object tracking using Kalman filter (칼만필터를 이용한 물체추적)

  • Song, Hyok;Seo, Duck-Won;Lee, Chul-Dong;Yoo, Ji-Sang
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.207-209
    • /
    • 2009
  • 다양한 센서 및 영상 카메라를 이용한 교통, 보안 및 안전 감시 시스템에 있어 처리해야 하는 영상 데이터의 양은 점점 커져가고 있다. 또한 단일 카메라가 아닌 많은 수의 카메라를 이용할 경우 운영자가 모든 영상 데이터를 확인하고 이에 대한 응답을 즉시 하기가 힘이 든다. 따라서 영상 데이터를 이용하기 위한 시스템에서 소프트웨어적인 처리는 필수이며 물체를 정확하게 추적하기 위해서는 물체를 인식하고 물체의 움직임을 예측하고 움직임을 보정하는 단계가 필요하다. 본 논문에서는 물체의 움직임을 정확히 추적하기 위하여 이동 물체를 추적할 때에 적절한 Kalman 필터를 이용하여 고속 물체 추적 시스템을 구현하였다.

  • PDF

2세대 모바일 LBS 시대가 열린다

  • Im, Yeong-Mo
    • Digital Contents
    • /
    • no.9 s.148
    • /
    • pp.56-59
    • /
    • 2005
  • 요즘 한창 휴대폰의 도청 가능성 여부를 놓고 정국이 시끌벅적하지만, 이에 못지 않게 논란이 됐던 게 바로 휴대폰을 이용한 위치 추적 사건이었다. 모 대기업에서 근로자의 휴대폰을 불법적으로 위치 추적하면서 불거졌던 이 사건은 결국 무혐의로 상황 종료되긴 했지만 위치정보법에 대한 필요성을 부각시킨 사례 중 하나라 할 수 있다. 최근 이러한 위치정보에 대한 법률적인 기반이 마련됐다. 지금까지 LBS(Location Based Service) 분야로 기반 환경 조성 차원의 투자 단계가 진행됐다면, 이제 본격적으로 법적인 제도화를 통해 안정적인 서비스 단계로의 전이가 일어나려는 수순이라 하겠다. 지난 달 디지털콘텐츠의‘이슈’코너에서도‘차세대 킬러 앱'LBS’뜨거운 감자’라는 내용으로 이에 대해 자세히 소개한 바 있기도 하다. 이번 모바일 핫토크에서는 이 LBS 관련 모바일 서비스들에 대한 전망에 대해 소개한다.

  • PDF

RFID Code System for Traceability of Medical Herb (한약재 이력 정보 추적을 위한 RFID 코드체계)

  • Kim, Chul;Kim, Sang-Kyun;Kim, Jin-Hyun;Song, Mi-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.973-977
    • /
    • 2009
  • The tracing system means that the system can follows, traces, and records every steps of production and delivery of goods and its ingredient. Specially, Koreans have big concern about food tracing system which is influential for health directly. We were more interested in medical herb using in oriental medicine than any other things. We proposed the process and design of tracing system for medical herb based on RFID(Radio Frequency IDentification) technology in this research. This study shows current medical herb tracing ways and RFID code system by using for world standard. Firstly, We designed the new process of traceability of medical herb with various preceding references based on RFID technology. Secondly we suggest that RFID code configuration using the international standard code(ISO code) and korean agricultural and marine products code for the proposed process. RFID code system is very important because this plays a means of identification for tracing about medical herb. The proposed code system have the elements as Issuing Agency Code, Issuer Number, inspection information, inheritance flag, area code, modified agricultural and marine products code, serial number in 96 Bit length. Lastly We defined the code-generation process in the tracing system.

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.