• 제목/요약/키워드: Manipulation detection

검색결과 89건 처리시간 0.025초

음압을 이용한 선삭작업에서의 채터감시 및 제어 (Monitoring and Control of Turning Chatter using Sound Pressure)

  • 이성일
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 1996년도 추계학술대회 논문
    • /
    • pp.85-90
    • /
    • 1996
  • In order to detect and suppress chatter in turning processes a stability control methodology was studied through manipulation of spindle speeds regarding to chatter frequencies. The chatter frequency was identified by monitoring and signal processing of sound pressure during turning on a lathe. The stability control methodology can select stable spindle speeds without knowing a prior knowledge of machine compliances and cutting dynamics. Teliability of the developed stability control methodology was verified through turning experiments on an engine lathe. Experimental results show that a microphone is an excellent sensor for chatter detection and control

  • PDF

반자동 영상 캐릭터 설계 시스템 (A Semi-Automated Image Character Design System)

  • 안재민;유현우;장동식
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2002년도 춘계공동학술대회
    • /
    • pp.1093-1096
    • /
    • 2002
  • In this paper, a new semi-automated cyber character generating method is presented. Local edge detection tools extract face contour from graphic image files. Some graphic manipulation process detailed touch to obtain neat face contour. This method shortens the making process dramatically while maintaining the good quality similar to real face image. Some of the processed images are illustrated for clear explanation.

  • PDF

메세지 체인 방식에 의한 인증 알고리즘에 관한 연구 (the Authentication Algorithm Based on the Message Chainning)

  • 안효범;박창섭
    • 정보보호학회지
    • /
    • 제3권4호
    • /
    • pp.27-37
    • /
    • 1993
  • 본 연구에서는 기존의 메세지 인증방식인 MAC(Message Aunthentication Code)와 MDC(Manipulation Detection Code)에 대한 제 3자의 적극적인 공격(active attack)하에서의 구조직인 취약점을 분석하고, 이를 보완하는 새로운 인증 방식을 제안하고 검증하였다. 새로운 메세지 인증방식은 기존의 방식과는 다르레 제3자의 공격을 받은 메세지 블럭을 바로 검출할 수 있다는 장점을 가지고 있기 때문에 통신 시스템 상에서 불필요한 메세지의 재전송을 줄일 수 있다는 측면에서 효율적인 인증 방식이다.

  • PDF

조기발견을 통한 보존적 치료가 척추 측만증에 미치는 영향 (Effects of Conservative Treatment on Scoliosis According to Early Detection)

  • 유재호;정상미
    • The Journal of Korean Physical Therapy
    • /
    • 제22권4호
    • /
    • pp.65-71
    • /
    • 2010
  • Purpose: The aim of this study was to describe the effects of conservative treatment intervention for individual with scoliosis. Methods: Studies were selected through a search of computerized databases of the literature (KERIS, 2000-2010) using "early detection", "conservative treatment", "exercise", "physical therapy", "manipulation", "chiropractic", "therapy", "taping" and "orthosis" as keywords. Selected articles were classified by research design and statistical methods. Results: Application of the search strategy to the KERIS databases resulted in 132 articles. Based on titles and abstracts, 17 studies were selected, excluding articles of overlapping study, surgery, pharmacologic therapy and no correcting aim under conservative treatment. Among the 17 selected studies, the majorityof study design consisted of one group pretest-posttest design and additionally most of these studies were paired (or independent) t-test. The most frequently used intervention was exercise therapy. Conclusion: All articles showed that interventions were effective. Thus, early detection of scoliosis may be connected participation of early conservative treatment. It is important to reduce prevalence of scoliosis in adolescents using regular evaluation as an effective measure.

작물 수확 자동화를 위한 시각 언어 모델 기반의 환경적응형 과수 검출 기술 (Domain Adaptive Fruit Detection Method based on a Vision-Language Model for Harvest Automation)

  • 남창우;송지민;진용식;이상준
    • 대한임베디드공학회논문지
    • /
    • 제19권2호
    • /
    • pp.73-81
    • /
    • 2024
  • Recently, mobile manipulators have been utilized in agriculture industry for weed removal and harvest automation. This paper proposes a domain adaptive fruit detection method for harvest automation, by utilizing OWL-ViT model which is an open-vocabulary object detection model. The vision-language model can detect objects based on text prompt, and therefore, it can be extended to detect objects of undefined categories. In the development of deep learning models for real-world problems, constructing a large-scale labeled dataset is a time-consuming task and heavily relies on human effort. To reduce the labor-intensive workload, we utilized a large-scale public dataset as a source domain data and employed a domain adaptation method. Adversarial learning was conducted between a domain discriminator and feature extractor to reduce the gap between the distribution of feature vectors from the source domain and our target domain data. We collected a target domain dataset in a real-like environment and conducted experiments to demonstrate the effectiveness of the proposed method. In experiments, the domain adaptation method improved the AP50 metric from 38.88% to 78.59% for detecting objects within the range of 2m, and we achieved 81.7% of manipulation success rate.

NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계 (A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS)

  • 송종화;이현섭
    • 사물인터넷융복합논문지
    • /
    • 제9권6호
    • /
    • pp.23-28
    • /
    • 2023
  • Windows 운영체제는 다양한 데이터를 타임스탬프와 함께 로깅한다. 타임스탬프 변조는 안티포렌식의 한 행위로 용의자가 범행과 관련된 데이터의 타임스탬프 조작을 통해 흔적을 숨겨 분석관이 사건의 상황 재현을 어렵게 하여 수사를 지연시키거나 중요한 디지털 증거 획득을 실패하게 만든다. 따라서 이를 대처하기 위해 타임스탬프 변조를 탐지하는 여러 기법이 개발되었다. 그러나 만일 용의자가 타임스탬프 패턴을 인지하고 정교하게 시간을 조작하거나 변조 탐지에 활용되는 시스템 아티팩트를 변경한다면 탐지가 어렵다는 한계점을 가지고 있다. 본 논문에서는 용의자가 파일의 타임스탬프를 조작하더라도 저장장치의 속도에 비례하여 1초 미만의 단위값까지를 고려한 정교한 변경이 어려움에 착안하여, 타임스탬프 변조를 탐지할 수 있는 기법을 설계하고자 한다. 설계한 탐지 기법에서는 우선 변조가 의심스러운 파일의 타임스탬프를 확인하여 해당 파일의 쓰기시간을 확인한다. 그다음 확인된 시간을 저장장치의 성능을 고려하여 시간 내에 기록된 파일 크기와 대조한다. 마지막으로 특정 시간에 파일이 쓰인 총용량을 구하고 저장장치의 최대 입출력 성능과 비교하여 파일의 변조 여부를 탐지한다.

프로파일 기반 악성 로더 공격탐지 및 필터링 기법 (Profile based Malicious Loader Attack Detection and Filtering Method)

  • 윤이중;김요식
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.21-29
    • /
    • 2006
  • 소프트웨어를 대상으로 하는 다양한 공격방법이 등장하고 있는 가운데 컴퓨터 소프트웨어에 대한 불법 조작 및 변조 등의 위협이 증가하고 있다. 특히, 온라인상에서 동작하는 어플리케이션 클라이언트를 대상으로 악의적인 로더 프로그램을 이용하여 프로그램의 코드를 조작하고, 흐름을 변조하여 정상적인 동작을 방해하는 행위가 날로 늘어나고 있다. 본 논문에서는 악의적인 용도로 사용되는 로더가 가지는 패턴을 분석하여 시그너처를 생성하고, 변형된 패턴을 탐지할 수 있고 시그너처 기법을 보완한 프로파일 기반의 탐지 기법을 제시한다.

  • PDF

Automatic Surface Matching for the Registration of LIDAR Data and MR Imagery

  • Habib, Ayman F.;Cheng, Rita W.T.;Kim, Eui-Myoung;Mitishita, Edson A.;Frayne, Richard;Ronsky, Janet L.
    • ETRI Journal
    • /
    • 제28권2호
    • /
    • pp.162-174
    • /
    • 2006
  • Several photogrammetric and geographic information system applications such as surface matching, object recognition, city modeling, environmental monitoring, and change detection deal with multiple versions of the same surface that have been derived from different sources and/or at different times. Surface registration is a necessary procedure prior to the manipulation of these 3D datasets. This need is also applicable in the field of medical imaging, where imaging modalities such as magnetic resonance imaging (MRI) can provide temporal 3D imagery for monitoring disease progression. This paper will present a general automated surface registration procedure that can establish correspondences between conjugate surface elements. Experimental results using light detection and ranging (LIDAR) and MRI data will verify the feasibility, robustness, and accuracy of this approach.

  • PDF

미소경 드릴링 머신의 시작과 감시에 관한 연구 (A Study on the Development and the Monitoring of Micro Hole Drilling Machine)

  • 백인환;정우섭
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제18권4호
    • /
    • pp.62-68
    • /
    • 1994
  • Recently, the trends toward reduction in size and weight of industrial products increased the application of micro hole for manufacturing gadgets of high precision and gave rise to a great deal of interest for micro hole drilling M/C. Quite a few research work is performed on micro drilling on domestic basis compared with the tendency of analyzing cutting mechanism, adaptive control, monitoring of generally available drills of diameter greater than 1mm. This study adresses the design, manufacturing and controlling a micro hole drilling M/C with the overload detection instrument and the step feed mechanism. Controlling and monitoring of the drilling process are acomplished on PC basis for more user interfaces and effectiveness. The test machine of the results of this research shows a good foundation for extending further micro hole machining technique.

  • PDF

Face Recognition Using a Facial Recognition System

  • Almurayziq, Tariq S;Alazani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.280-286
    • /
    • 2022
  • Facial recognition system is a biometric manipulation. Its applicability is simpler, and its work range is broader than fingerprints, iris scans, signatures, etc. The system utilizes two technologies, such as face detection and recognition. This study aims to develop a facial recognition system to recognize person's faces. Facial recognition system can map facial characteristics from photos or videos and compare the information with a given facial database to find a match, which helps identify a face. The proposed system can assist in face recognition. The developed system records several images, processes recorded images, checks for any match in the database, and returns the result. The developed technology can recognize multiple faces in live recordings.