• Title/Summary/Keyword: 침입성

Search Result 1,047, Processing Time 0.032 seconds

A Design of Mobile Robot based on Camera and Sound Source Localization for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 영상과 음원 추적 기반 임베디드 모바일로봇 개발)

  • Park, Jung-Hyun;Kim, Hyung-Bok;Oh, Jung-Suk;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.532-537
    • /
    • 2009
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. In this paper, we embodied unmanned intelligent system by developing embedded mobile robot based on images and sounds tracking. For objects tracking, we used block-matching algorithm and for sound source tracking, we calculated time differences and magnitude dissimilarities of sound. And we demonstrated the superiority of intruder tracking algorithm through the embodiment of Pan-Tilt camera and sound source tracking module using system, Network camera and mobile robot using system and mobile robot using system. By linking security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

A Study of New High Temperature Grading for Modified and Unmodified Asphalt Binders (개질 및 비개질 아스팔트 바인더의 새로운 고온등급 연구)

  • Huh, Jung-Do;Cho, Gyu-Tae;Nam, Young-Kug
    • International Journal of Highway Engineering
    • /
    • v.3 no.2 s.8
    • /
    • pp.91-102
    • /
    • 2001
  • On the basis of several experiments peformed, Bahia et al. (1998) concluded that the current Superpave PG-grading system failed to characterize grading specification of fill modified binders. This conclusion motivates us to investigate the correct grating system suited for modified asphalt binders. The main concept of this development is originated from the relationship between rut depth and binder properties at high temperatures. A new grading system for modified asphalt binders suggested here somewhat resembles to the unmodified binder grading one developed by Huh et al. (2000). Thus, this investigation will provide a unified single theoretical equation of high temperature grading that can apply both to modified and unmodified binders, and will check its effectiveness with the laboratory and the field rut data reported by independent studies. Successful results observed may allow to construction of a correct grading system in the near future.

  • PDF

The Importance of Host Factors for the Replication of Plant RNA Viruses (식물 바이러스 증식에 관여하는 기주 요인의 중요성)

  • Park Mi-Ri;Kim Kook-Hyung
    • Research in Plant Disease
    • /
    • v.11 no.2
    • /
    • pp.98-105
    • /
    • 2005
  • All viruses have few genes relative to their hosts. Viruses, thus, utilize many host factors for efficient viral replication in host cell. Virus-host interactions are crucial determinations of host range, replication, and pathology. Host factors participate in most steps of positive-strand RNA virus infection, including entry, viral gene expression, virion assembly, and release. Recent data show that host factors play important roles in assembling the viral RNA replication complex, selecting and recruiting viral RNA replication templates, activating the viral complex for RNA synthesis, and the other steps. These virus-host interactions may contribute to the host specificity and/or pathology. Positive-strand RNA viruses encompass over two-thirds of all virus genera and include numerous pathogens. This review focuses on the importance of host factors involved in positive strand plant RNA virus genome replication.

Experimental Study on Determination of Infiltration Capacity of Ground Surface and Pervious Pedestrian Blocks (지표면과 투수성 보도 블록의 침투능 결정에 관한 실험적 연구)

  • Yoo, Kyung-Hee;Byeon, Chun-Il;Kim, Kyung-Sup;Ahn, Tae-Jin
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Infiltration is the process of water penetrating from the ground surface into soil. Infiltration plays an important role on affecting ground water surface and surface flow during rainy season. The amount of infiltration water would be decreased as the urbanization would increase. Such phenomenons would make streamflow decrease or stream run dry. In this study the cumulative infiltration and the infiltration capacity of ground surface have been determined by the field experiment at three sites in the Hankyong National University, Korea. Three type pervious pedestrian blocks of the cumulative infiltration and the infiltration capacity have also been determined at the same site of the ground surface. It has been shown that one of three type blocks in terms of infiltration capacity is almost same as that of ground surface. The Kostiakov type has been adopted to determine the cumulative infiltration and the infiltration capacity for each site. The Horton type has been also adopted to determine the cumulative infiltration and the infiltration capacity. The value of parameter k for each site is determined and soil type would be identified corresponding to the value of parameter.

The Genetic Structure of Kimpo Natual Population of Drosophila melanogaster (Drosophila melanogaster의 김포 자연집단이 유전적 구조)

  • 이택준;김남우
    • The Korean Journal of Zoology
    • /
    • v.33 no.1
    • /
    • pp.6-11
    • /
    • 1990
  • Analysis of genetic structure in Kimpo natural population of Drosophila was carried out by utilizing the deleterious gene on the second chromosome of Drosophila melanogaster. Male flies tested were continuously collected for eight years; in late September 1974 and 1981-1987. The frequency of deleterious gene (lethal plus semilethal) ranged from 27.02% in 1983 to 41.48% in 1987, and the values estimated from the eight years samples are highly signihcent from each other with a homogenety test (X$^2$=52.0157, d.f.=28, P<0.005). Allelic rates ranged from 1.30% in 1981 to 5.03% in 1974. And the effective population size by using the rate of allelism was estimated average at 3, 300 pairs. Elimination rate by homozygous of lethal gene ranged from 0.0004 in 1984 to 0.0019 in 1974, and that is for smaller than mutation rate(0.005) at second chromosome. We suppose that stable frequency (about 20%) lethal genes of D. melanogaster in Kimpo natual population are maintained by invade of P-type mutator factor (P element) versus eliminated in heterozygous and homozygous condition of lethal gene.

  • PDF

Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors (이 기종간 통합 센서를 이용한 센서네트워크 환경에서의 지능형 보안감시 시스템)

  • Oh, Suk-Jun;Moon, Seung-Jin;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.551-562
    • /
    • 2013
  • Current CCTV systems, which require continuous monitoring of the screens, have the limitation to detect and respond to the crime scenes in timely manner. Therefore, in recent years, the request for more intlligent surveillance system, with a ubiquitous sensor network, is increasing in order to behave more humanly fashions. Such systems require cllective data processing of the environments based on various sensors. In this article, we suggests a new paradigm based surveillance system which integrates PSD and dual PIR sensors. The proposed system evlves from a existing indoor intrusion detection system which can only identify the intrusion event to a better inteligent system with context awareness. We have conducted the various simulations in order to prove the effectiveness of the proposed system.

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.