• Title/Summary/Keyword: Online detection

Search Result 334, Processing Time 0.021 seconds

A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service (온라인 간편 결제 환경에서 기계학습을 이용한 무자각 인증 기술 연구)

  • Ryu, Gwonsang;Seo, Changho;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1419-1429
    • /
    • 2017
  • Recently, environment based authentication technique had proposed reinforced authentication, which generating statistical model per user after user login history classifies into account takeover or legitimate login. But reinforced authentication is likely to be attacked if user was not attacked in past. To improve this problem in this paper, we propose unconsciousness authentication technique that generates 2-Class user model, which trains user's environmental information and others' one using machine learning algorithms. To evaluate performance of proposed technique, we performed evasion attacks: non-knowledge attacker that does not know any information about user, and sophisticated attacker that only knows one information about user. Experimental results against non-knowledge attacker show that precision and recall of Class 0 were measured as 1.0 and 0.998 respectively, and experimental results against sophisticated attacker show that precision and recall of Class 0 were measured as 0.948 and 0.998 respectively.

Development of Automatic Reference-Citation-Mark Attachment Support System (참고문헌 인용부호 자동부착 지원 시스템 개발)

  • Song, Kwangho;Min, Jihong;Kim, Yoo-sung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.623-630
    • /
    • 2015
  • In this paper, the design and implementation of an automatic reference-citation-mark attachment system are introduced. The system automatically attaches a citation mark to the end of a sentence in a technical document if the corresponding statement has a high similarity to another statement in the same document; simultaneously, the corresponding bibliographic data is automatically created from the cited-document information. In accordance with functional specifications, a Web-based, online service model and the development of its prototype system are proposed. The developed system can help in the elimination of unexpected plagiarism issues, and will alleviate the burdens of reference citation and reference-list creation for technical writers.

A Study of 3D World Reconstruction and Dynamic Object Detection using Stereo Images (스테레오 영상을 활용한 3차원 지도 복원과 동적 물체 검출에 관한 연구)

  • Seo, Bo-Gil;Yoon, Young Ho;Kim, Kyu Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.326-331
    • /
    • 2019
  • In the real world, there are both dynamic objects and static objects, but an autonomous vehicle or mobile robot cannot distinguish between them, even though a human can distinguish them easily. It is important to distinguish static objects from dynamic objects clearly to perform autonomous driving successfully and stably for an autonomous vehicle or mobile robot. To do this, various sensor systems can be used, like cameras and LiDAR. Stereo camera images are used often for autonomous driving. The stereo camera images can be used in object recognition areas like object segmentation, classification, and tracking, as well as navigation areas like 3D world reconstruction. This study suggests a method to distinguish static/dynamic objects using stereo vision for an online autonomous vehicle and mobile robot. The method was applied to a 3D world map reconstructed from stereo vision for navigation and had 99.81% accuracy.

Analysis of Security Requirements for Session-Oriented Cross Play Using X-box (X-box를 이용한 Session-oriented Cross play에 대한 보안 요구사항 분석)

  • Kim, Dong-woo;Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.235-255
    • /
    • 2019
  • Recent technological advances and industry changes, the game industry is maximizing fun by supporting cross-play that can be enjoyed by different platform users in PC, Mobile and Console games. If the boundaries are lost through the cross play, unexpected security threats can occur due to new services, even if existing security is maintained above a certain level. The existing online game security researches are mostly fraud detection that can occur in PC and mobile environment, but it is also necessary to study the security of the console game as cross play becomes possible. Therefore, this paper systematically identifies the security threats that can occur when enjoying cross play against console game users using STRIDE and LINDDUN threat modeling, derives security requirements using the international common evaluation standard.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Robust Object Tracking based on Weight Control in Particle Swarm Optimization (파티클 스웜 최적화에서의 가중치 조절에 기반한 강인한 객체 추적 알고리즘)

  • Kang, Kyuchang;Bae, Changseok;Chung, Yuk Ying
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.15-29
    • /
    • 2018
  • This paper proposes an enhanced object tracking algorithm to compensate the lack of temporal information in existing particle swarm optimization based object trackers using the trajectory of the target object. The proposed scheme also enables the tracking and documentation of the location of an online updated set of distractions. Based on the trajectories information and the distraction set, a rule based approach with adaptive parameters is utilized for occlusion detection and determination of the target position. Compare to existing algorithms, the proposed approach provides more comprehensive use of available information and does not require manual adjustment of threshold values. Moreover, an effective weight adjustment function is proposed to alleviate the diversity loss and pre-mature convergence problem in particle swarm optimization. The proposed weight function ensures particles to search thoroughly in the frame before convergence to an optimum solution. In the existence of multiple objects with similar feature composition, this algorithm is tested to significantly reduce convergence to nearby distractions compared to the other existing swarm intelligence based object trackers.

Systematic Review and Meta-analysis of Chuna Therapy for Sciatica (좌골신경통에 적용한 추나 치료에 대한 체계적 문헌 고찰 및 메타 분석)

  • Hong, Su Min;Oh, Seung Joon;Lee, Eun Jung
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.34 no.6
    • /
    • pp.299-308
    • /
    • 2020
  • This study aimed to evaluate the effects of Chuna therapy for Sciatica. We searched the following 16 online databases without a language restriction (Pubmed, Cochrane, Embase, CINAHL, Ovid, Kmbase, RISS, NDSL, OASIS, KISS, KNAL, KTKP, DBpia, CNKI, Wangfang, J-stage) to find randomized controlled clinical trials that used Chuna therapy for Sciatica. The methodological quality of randomized controlled clinical trials (RCTs) were assessed using the Cochrane risk of bias tool and meta-analysis were performed. Among 496 articles that were searched, 15 RCTs were finally selected for systematic review. 14 studies showed that Chuna therapy has positive effect on sciatica. Two studies noted that there were side effects, and the difference between the intervention group and the control group was statistically insignificant. One study noted no side effects and the rest of the study, there was no mention of side effects. Meta-analysis showed positive results for Chuna single therapy in terms of efficiency rate compared to painkiller, herb medicine excepting acupuncture. When comparing Chuna therapy plus acupuncture and acupuncture, Chuna therapy plus acupuncture had a more positive result than acupuncture in terms of efficiency rate. Cochrane Risk of Bias (RoB)evaluation method, most of the studies's selection, performance, detection and reporting bias were unclear. The studies showed that Chuna therapy can significantly effective on sciatica. However, most of the studies's Risk of Bias included in the analysis were not low enough. In the future, to prove the level of evidence of Chuna therapy, more high-quality studies will be needed.

Diagnostic accuracy of imaging examinations for peri-implant bone defects around titanium and zirconium dioxide implants: A systematic review and meta-analysis

  • Chagas, Mariana Murai;Kobayashi-Velasco, Solange;Gimenez, Thais;Cavalcanti, Marcelo Gusmao Paraiso
    • Imaging Science in Dentistry
    • /
    • v.51 no.4
    • /
    • pp.363-372
    • /
    • 2021
  • Purpose: This systematic review and meta-analysis assessed the diagnostic accuracy of imaging examinations for the detection of peri-implant bone defects and compared the diagnostic accuracy between titanium (Ti) and zirconium dioxide (ZrO2) implants. Materials and Methods: Six online databases were searched, and studies were selected based on eligibility criteria. The studies included in the systematic review underwent bias and applicability assessment using the Quality Assessment of Diagnostic Accuracy Studies 2 (QUADAS-2) tool and a random-effect meta-analysis. Summary receiver operating characteristic (sROC) curves were constructed to compare the effect of methodological differences in relation to the variables of each group. Results: The search strategy yielded 719 articles. Titles and abstracts were read and 61 studies were selected for full-text reading. Among them, 24 studies were included in this systematic review. Most included studies had a low risk of bias (QUADAS-2). Cone-beam computed tomography (CBCT) presented sufficient data for quantitative analysis in ZrO2 and Ti implants. The meta-analysis revealed high levels of inconsistency in the latter group. Regarding sROC curves, the area under the curve (AUC) was larger for the overall Ti group (AUC=0.79) than for the overall ZrO2 group (AUC=0.69), but without a statistically significant difference between them. In Ti implants, the AUCs for dehiscence defects(0.73) and fenestration defects(0.87) showed a statistically significant difference. Conclusion: The diagnostic accuracy of CBCT imaging in the assessment of peri-implant bone defects was similar between Ti and ZrO2 implants, and fenestration was more accurately diagnosed than dehiscence in Ti implants.

SEARCHING FOR TRANSIT TIMING VARIATIONS AND FITTING A NEW EPHEMERIS TO TRANSITS OF TRES-1 B

  • Yeung, Paige;Perian, Quinn;Robertson, Peyton;Fitzgerald, Michael;Fowler, Martin;Sienkiewicz, Frank;Tock, Kalee
    • Journal of The Korean Astronomical Society
    • /
    • v.55 no.4
    • /
    • pp.111-121
    • /
    • 2022
  • Based on the light an exoplanet blocks from its host star as it passes in front of it during a transit, the mid-transit time can be determined. Periodic variations in mid-transit times can indicate another planet's gravitational influence. We investigate 83 transits of TrES-1 b as observed from 6-inch telescopes in the MicroObservatory robotic telescope network. The EXOTIC data reduction pipeline is used to process these transits, fit transit models to light curves, and calculate transit midpoints. This paper details the methodology for analyzing transit timing variations (TTVs) and using transit measurements to maintain ephemerides. The application of Lomb-Scargle period analysis for studying the plausibility of TTVs is explained. The analysis of the resultant TTVs from 46 transits from MicroObservatory and 47 transits from archival data in the Exoplanet Transit Database indicated the possible existence of other planets affecting the orbit of TrES-1 and improved the precision of the ephemeris by one order of magnitude. We now estimate the ephemeris to be (2 455 489.66026 BJDTDB ± 0.00044 d) + (3.0300689 ± 0.0000007) d × epoch. This analysis also demonstrates the role of small telescopes in making precise midtransit time measurements, which can be used to help maintain ephemerides and perform TTV analysis. The maintenance of ephemerides allows for an increased ability to optimize telescope time on large ground-based telescopes and space telescope missions.

Predictors of anxiety and depression in Korean adults during COVID-19 pandemic (COVID-19 팬데믹 시대 성인의 불안과 우울의 예측 요인)

  • Sohn, Jung Nam
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.28 no.3
    • /
    • pp.328-339
    • /
    • 2022
  • Purpose: This study was conducted to identify the mental health status of Korean adults during the COVID-19 pandemic and to verify the predictors and mediating effects of avoidance coping on the relationship between the intolerance of uncertainty and anxiety and the intolerance of uncertainty and depression. Methods: An online survey was completed by 191 Korean adults from 19 to 64 years old. Using the IBM SPSS Win 19.0 program, the data were analyzed through the frequency, mean, t-test or analysis of variance, Pearson's correlation coefficient, linear regression analysis and Sobel test. Results: Of the survey respondents 21.5%, and 33.5% respectively were classified into anxiety and depression risk groups. The predictors of anxiety were intolerance of uncertainty (β=.52), avoidance coping (β=.21), and response efficacy (β=-.15). Those variables explained 47.7% of the respondents' anxiety. The predictors of depression were intolerance of uncertainty (β=.40), avoidance coping (β=.20), and response-efficacy (β=-.12). These variables explained 34.9% of the participants' depression. Among the predictors of anxiety and depression, avoidance coping was the significant mediating variable. Conclusion: The predictors of anxiety and depression during the COVID-19 pandemic were revealed to be intolerance of uncertainty, avoidance coping, and response-efficacy. These results indicate the necessity of providing the cognitive interventions and reducing the use of avoidance coping strategies on a personal level. Community-level efforts, including early detection and health communication strategies, should prioritize risk groups for example young adults. The study suggests it will be necessary to provide sufficient information, psychological support and economic policy alternatives related to the COVID-19 pandemic on the national level.