• Title/Summary/Keyword: 탐지성능 분석

Search Result 850, Processing Time 0.027 seconds

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

Robust Maneuvering Target Tracking Applying the Concept of Multiple Model Filter and the Fusion of Multi-Sensor (다중센서 융합 및 다수모델 필터 개념을 적용한 강인한 기동물체 추적)

  • Hyun, Dae-Hwan;Yoon, Hee-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.51-64
    • /
    • 2009
  • A location tracking sensor such as GPS, INS, Radar, and optical equipments is used in tracking Maneuvering Targets with a multi-sensor, and such systems are used to track, detect, and control UAV, guided missile, and spaceship. Until now, Most of the studies related to tracking Maneuvering Targets are on fusing multiple Radars, or adding a supplementary sensor to INS and GPS. However, A study is required to change the degree of application in fusions since the system property and error property are different from sensors. In this paper, we perform the error analysis of the sensor properties by adding a ground radar to GPS and INS for improving the tracking performance by multi-sensor fusion, and suggest the tracking algorithm that improves the precision and stability by changing the sensor probability of each sensor according to the error. For evaluation, we extract the altitude values in a simulation for the trajectory of UAV and apply the suggested algorithm to carry out the performance analysis. In this study, we change the weight of the evaluated values according to the degree of error between the navigation information of each sensor to improve the precision of navigation information, and made it possible to have a strong tracking which is not affected by external purposed environmental change and disturbance.

  • PDF

Performance Evaluation of a Portable GC for Real-time Monitoring of Volatile Organic Compounds (휘발성 유기화합물의 실시간 모니터링을 위한 휴대형 GC의 성능 평가)

  • You, Dong-Wook;Seon, Yeong-Sik;Oh, Jun-Sik;Yi, Bongyoon;Kim, Hyun Sik;Jung, Kwang-Woo
    • Journal of the Korean Chemical Society
    • /
    • v.64 no.6
    • /
    • pp.327-333
    • /
    • 2020
  • Performance of a portable GC that can be utilized for the real time determination of volatile organic compounds in air was evaluated. It employs purified/compressed ambient air as the carrier gas eliminating the need for high pressure gas tanks. The compact system with dimensions of 35 × 26 × 15 ㎤ and weight of 5 kg is powered by either a 24 V DC external adapter or battery pack. Chromatograms of the mixture sample including benzene, toluene, ethylbenzene, and oxylene at concentrations of 1 ppmv and 20 ppmv represent a good reproducibility: 3.79% and 0.48% relative standard deviations (RSDs) for peak area variations; 0.40% and 0.08% RSDs for retention times. The method detection limit was 0.09 ppmv. A 30 m long, 0.28 mm I.D. column operated at an optimal condition yielded a peak capacity of 61 with good resolution for a 10 min isothermal analysis. The relative standard deviations (RSD) of the peak area variations and retention times during consecutive measurements over 27 h were less than 2.4%RSD and 0.5%RSD, respectively. Thus, this instrument makes it suitable for continuous and field analysis of low-concentration VOC mixtures in the indoor/outdoor environment as well as the spillage accident of hazardous chemicals.

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Analysis of Infiltration Route using Optimal Path Finding Methods and Geospatial Information (지형공간정보 및 최적탐색기법을 이용한 최적침투경로 분석)

  • Bang, Soo Nam;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.195-202
    • /
    • 2006
  • The infiltration route analysis is a military application using geospatial information technology. The result of the analysis would present vulnerable routes for potential enemy infiltration. In order to find the susceptible routes, optimal path search algorithms (Dijkstra's and $A^*$) were used to minimize the cost function, summation of detection probability. The cost function was produced by capability of TOD (Thermal Observation Device), results of viewshed analysis using DEM (Digital Elevation Model) and two related geospatial information coverages (obstacle and vegetation) extracted from VITD (Vector product Interim Terrain Data). With respect to 50m by 50m cells, the individual cost was computed and recorded, and then the optimal infiltration routes was found while minimizing summation of the costs on the routes. The proposed algorithm was experimented in Daejeon region in South Korea. The test results show that Dijkstra's and $A^*$ algorithms do not present significant differences, but A* algorithm shows a better efficiency. This application can be used for both infiltration and surveillance. Using simulation of moving TOD, the most vulnerable routes can be detected for infiltration purpose. On the other hands, it can be inversely used for selection of the best locations of TOD. This is an example of powerful geospatial solution for military application.

Gunnery Classification Method Using Profile Feature Extraction in Infrared Images (적외선 영상에서의 시계열 특징 추출을 이용한 Gunnery 분류 기법 연구)

  • Kim, Jae-Hyup;Cho, Tae-Wook;Chun, Seung-Woo;Lee, Jong-Min;Moon, Young-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.43-53
    • /
    • 2014
  • Gunnery has been used to detect and classify artilleries. In this paper, we used electro-optical data to get the information of muzzle flash from the artilleries. Feature based approach was applied; we first defined features and sub-features. The number of sub-features was 38~40 generic sub-features, and 2 model-based sub-features. To classify multiclass data, we introduced tree structure with clustering the classes according to the similarity of them. SVM was used for each non-leaf nodes in the tree, as a sub-classifier. From the data, we extracted features and sub-features and classified them by the tree structure SVM classifier. The results showed that the performance of our classifier was good for our muzzle flash classification problem.

Take-Over Time Determination for High-Velocity Targets in a Multiple Radar System (다중 레이다 시스템의 고속표적 인계 시점 결정기법 연구)

  • Park, Soon-Seo;Jang, Dae-Sung;Choi, Han-Lim;Kim, Eun-Hee;Sun, Woong;Lee, Jong-Hyun;Yoo, Dong-Gil
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.3
    • /
    • pp.307-316
    • /
    • 2016
  • A multiple radar system is comprised of early warning radar for fast detection of a target and air defense radar for precision intercept. For this reason, target take-over process is required between the two radars. The target take-over should be performed at an appropriate time by consideration of stable tracking and effective fire control. In this paper, operation characteristics of multiple radar system are analyzed and target take-over time determination method using estimation of target tracking performance is proposed for high-velocity targets. The proposed method is validated with ballistic target defense scenarios in the developed integrated simulator.

A Study on Block Processing Approach for Mono-Static Terrain Imaging Radar (모노스태틱 지형 영상 레이더의 블록 처리 기법 연구)

  • Ha, Jong-Soo;Cho, Byung-Lae;Lee, Jung-Soo;Park, Gyu-Churl;Sun, Sun-Gu;Kang, Tae-Ha
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.5
    • /
    • pp.549-557
    • /
    • 2013
  • This paper describes a block processing approach to detect targets in front of mono-static terrain imaging radar (TIR). It is difficult to employ several conventional imaging methods of the synthetic aperture radar(SAR) because the TIR is an ultra-wide-band(UWB) type of radar and employs a dechirp-on-receive process. To design an available imaging method, a block processing approach which conducts a range compression and an azimuth compression is proposed in this paper. The complete derivation of the proposed approach is presented. The results of simulations and field tests are demonstrated to show the performance and validity of the proposed approach.

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Resilient Security Protocol for Combating Replay Attacks in Wireless Sensor Networks (리플레이 공격 방어를 위한 무선 센서 네트워크 보안 프로토콜)

  • Zhang, Di;Heo, Ung;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.70-80
    • /
    • 2010
  • Due to the resource limitations of sensor nodes, providing a security protocol is a particular challenge in sensor networks. One popular method is the neighborhood-based key agreement protocol (NEKAP). NEKAP is an efficient and lightweight protocol, but it includes loopholes through which adversaries may launch replay attacks by successfully masquerading as legitimate nodes. In this paper, we present a modified security protocol for wireless sensor networks. We provide four types of keys for each node, which adapt to different security requirements; and an improvement is made to alleviate the replay attack. According to our qualitative performance analyses, the proposed security protocol provides effectiveness in terms of authentication security, attacking node detection, and replay attack resilience when compared to the conventional method.