• Title/Summary/Keyword: Cyber space

Search Result 477, Processing Time 0.029 seconds

3D FACE RECONSTRUCTION FROM ROTATIONAL MOTION

  • Sugaya, Yoshiko;Ando, Shingo;Suzuki, Akira;Koike, Hideki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.714-718
    • /
    • 2009
  • 3D reconstruction of a human face from an image sequence remains an important problem in computer vision. We propose a method, based on a factorization algorithm, that reconstructs a 3D face model from short image sequences exhibiting rotational motion. Factorization algorithms can recover structure and motion simultaneously from one image sequence, but they usually require that all feature points be well tracked. Under rotational motion, however, feature tracking often fails due to occlusion and frame out of features. Additionally, the paucity of images may make feature tracking more difficult or decrease reconstruction accuracy. The proposed 3D reconstruction approach can handle short image sequences exhibiting rotational motion wherein feature points are likely to be missing. We implement the proposal as a reconstruction method; it employs image sequence division and a feature tracking method that uses Active Appearance Models to avoid the failure of feature tracking. Experiments conducted on an image sequence of a human face demonstrate the effectiveness of the proposed method.

  • PDF

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

A Study on the Application of 3D Digital Technology to Producing Cyber Fashion Gallery (3D 디지털 기술을 활용한 패션 갤러리 제작에 관한 연구)

  • Kim, Ji-Eon
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.3 s.68
    • /
    • pp.446-460
    • /
    • 2007
  • This study shows that digital technology is adapted practical method in fashion design process and virtual simulation and cyber fashion gallery based on virtual reality are researched. This study is proposed the 3D fashion design simulation in the virtual space used on 3D studio max, poser, photoshop program according to fashion design process. The main design concept is "temporary bridge" from rainbow. This study is supposed six fashion design in accordance with three sub-theme under main concept by changing color and texture used on 3D simulation. The results of this study are as follows: 1. This study produced Cyber Fashion Gallery in virtual space to the form of CD Rom title and web title by Macromedia Director 8.5, Macromedia Flash, Sound Forge. And it is enlarged the field of expression in aspect of Fashion Exhibition, beyond restriction of time and space. 2. Clothes modelling tools is able to easily adapt to various textiles and patterns in 3D dynamic virtual mannequin before making clothes. Digital technology is able to express image changed color and texture, especially new material, multi-finishing material and brilliant material and so on. So this study is able to develop tools for study of fashion coordination. 3. Cyber Fashion Gallery consists of gallery, story, painting, symbolism, example, image, quit. This study is enlarged the range of clothing expression by digital technology and open to possibility customized-manufacture.

  • PDF

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Deokhu's culture in adolescent as a play space on Cyber (사이버상의 놀이 공간으로서 청소년의 덕후 문화)

  • Huh, Jeung-Kyeung
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • The purpose of this study is to explore the essential meaning of Deokhu's culture in adolescent as a play space on Cyber. A phenomenological research method guided data collection and analysis. Qualitative research methods collected from 18 in - depth interviews using semistructured question types for 13 to 17 year - old adolescents living in Seoul Jamsil. As a result, As a result, adolescent's Deokhu culture started by stress and social and emotional desire, and especially it was utilized as a play space on the cyber of purchase activity of fandom and goods around SNS activities. This has a positive effect on self-awareness as well as self-identity formation. Above all, the shortage of play time due to heavy school entrance and the lack of socially provided play space make the cyber space as another play space for the adolescents.

A Study on the Model of Cyber Elementary School (사이버초등학교 모형에 관한 연구)

  • Kim, Jeong-Rang
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.3
    • /
    • pp.385-394
    • /
    • 2004
  • The process for the information society centered on the internet supplied us a space of another life, cyber space. In the reality that the cyber space exercised its influence on the our society outstandingly, this researcher think that it needs to have to discuss about the cyber school in the elementary schools by making use of experience the soft landing of cyber university. This study suggested the model of cyber elementary school applicable to the elementary schools, and discussed with the operational plan by the model. Also, it examined the field teachers' opinions about the model classification and operation through the questionnaire, and analyzed the result. It was divided into the four sorts of cyber elementary schools like the school support type, school associated type, and independent type, and transitional period type. This study researched the concept by the model each, the object and purpose of major education, the operational system, curriculum and contents. As a result of collecting their opinions through the questionnaire, it is desirable to be operated as the transitional period type and the school support type in case of the introduction of cyber elementary schools in the present elementary schools.

  • PDF