• Title/Summary/Keyword: Real Security

Search Result 1,826, Processing Time 0.026 seconds

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

A research on the selection of subject and its legal and institutional guarantee concerning protection of the intellectual property of traditional medicine (전통의약분야의 지적 재산권 보호를 위한 대상 발굴 및 법적.제도적 보장 방안 연구)

  • Kim, Hong-Jun;Lee, Sang-Jung;Ju, Young-Sung
    • Korean Journal of Oriental Medicine
    • /
    • v.8 no.2 s.9
    • /
    • pp.47-65
    • /
    • 2002
  • This project is planned to grasp the present situation of traditional medicine part in our country and to study protection method about this by the intellectual property which is the international concerning point recently. Through this, we will be able to devise means to deal with protection method of traditional medicine being developed by WIPO now. Traditional medicine field In our country Is organized with specific condition separated into the part of institution and the part of non-institution. So, because of the closed peculiarity, we have experienced the difficulties to understand the real facts about traditional medicine. We cannot be indifferent to the matter anymore. Because the expectation of object people is high, we could expect the realization of research content. In 1 detail project, we investigated the situation of traditional medicine in our country through various collecting methods for excavation of oriental treatment technique and herb medicine which is worth protecting. With it, we sorted again into 56 kinds of 11 parts through analysis of validity in the way of oriental medicine. And we tried to link this up 2 detail project which is about legal and institutional guarantee concerning protection. furthermore, we tried to find approach ways for security of objectivity into 4 steps with the example of model disease. we could complete practical classification of traditional medicine in our country. In 2 detail project, we studied the protection method by the intellectual property through research result in 1 detail project. For this, we observed an outline of the intellectual property including a patent application analysis in folk traditional medicine part, and problems of traditional medicine protection and world trend by traditional knowledge protection tendency and the patent law In domestic traditional medicines, the aspects unprotectable with the patent law now were remained. So, we suggested supplementary plan. And we also suggested the freedom of utilization between traditional medicine possession countries (in-situ utilization) and the demand compensation payment for a third country (ex-situ utilization) in connection with international movement.

  • PDF

A Study on Implementation of an Intelligent Video Surveillance System for Effective Education Method of Image Processing (효율적인 영상 처리 교육방법을 위한 지능형 영상 감시 시스템 구현에 관한 연구)

  • Park, Ho-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.84-88
    • /
    • 2010
  • Recently, it is essential to have the system which can track down and identity the random object in the space in which security is a high priority. Due to the fact that we mentioned above, in this paper. We suggest the intelligent video surveillance system effective image-process-education in this paper. The experiment was conducted to check and track down the entering vehicle. And, Pan-Tilt-Zoom camera was used to obtain the enlarged image of the object while a vehicle was making stop in target area. As a result, the experiment has shown the data as following. When the object is in motion, success rate is 97.4%, while success rate is 91% when the object is motionless. By using the suggested system, effective image-process-education is should be achieved because the students who participate in the class can have simultaneous access to the system for real time image data and camera control.

  • PDF

Object Tracking in HEVC Bitstreams (HEVC 스트림 상에서의 객체 추적 방법)

  • Park, Dongmin;Lee, Dongkyu;Oh, Seoung-Jun
    • Journal of Broadcast Engineering
    • /
    • v.20 no.3
    • /
    • pp.449-463
    • /
    • 2015
  • Video object tracking is important for variety of applications, such as security, video indexing and retrieval, video surveillance, communication, and compression. This paper proposes an object tracking method in HEVC bitstreams. Without pixel reconstruction, motion vector (MV) and size of prediction unit in the bitstream are employed in an Spatio-Temporal Markov Random Fields (ST-MRF) model which represents the spatial and temporal aspects of the object's motion. Coefficient-based object shape adjustment is proposed to solve the over-segmentation and the error propagation problems caused in other methods. In the experimental results, the proposed method provides on average precision of 86.4%, recall of 79.8% and F-measure of 81.1%. The proposed method achieves an F-measure improvement of up to 9% for over-segmented results in the other method even though it provides only average F-measure improvement of 0.2% with respect to the other method. The total processing time is 5.4ms per frame, allowing the algorithm to be applied in real-time applications.

Pedestrian Counting System based on Average Filter Tracking for Measuring Advertisement Effectiveness of Digital Signage (디지털 사이니지의 광고효과 측정을 위한 평균 필터 추적 기반 유동인구 수 측정 시스템)

  • Kim, Kiyong;Yoon, Kyoungro
    • Journal of Broadcast Engineering
    • /
    • v.21 no.4
    • /
    • pp.493-505
    • /
    • 2016
  • Among modern computer vision and video surveillance systems, the pedestrian counting system is a one of important systems in terms of security, scheduling and advertising. In the field of, pedestrian counting remains a variety of challenges such as changes in illumination, partial occlusion, overlap and people detection. During pedestrian counting process, the biggest problem is occlusion effect in crowded environment. Occlusion and overlap must be resolved for accurate people counting. In this paper, we propose a novel pedestrian counting system which improves existing pedestrian tracking method. Unlike existing pedestrian tracking method, proposed method shows that average filter tracking method can improve tracking performance. Also proposed method improves tracking performance through frame compensation and outlier removal. At the same time, we keep various information of tracking objects. The proposed method improves counting accuracy and reduces error rate about S6 dataset and S7 dataset. Also our system provides real time detection at the rate of 80 fps.

Development of a Collision Risk Assessment System for Optimum Safe Route (최적안전항로를 위한 충돌위험도 평가시스템의 개발)

  • Jeon, Ho-Kun;Jung, Yun-Chul
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.670-678
    • /
    • 2018
  • In coastal waters where the traffic volume of the ship is high, there is a high possibility of a collision accident because complicated encounter situations frequently occurs between ships. To reduce the collision accidents at sea, a quantitative collision risk assessment is required in addition to the navigator's compliance with COLREG. In this study, a new collision risk assessment system was developed to evaluate the collision risk on ship's planned sailing routes. The appropriate collision risk assessment method was proposed on the basis of reviewing existing collision risk assessment models. The system was developed using MATLAB and it consists of three parts: Map, Bumper and Assessment. The developed system was applied to the test sea area with simple computational conditions for testing and to actual sea areas with real computational conditions for validation. The results show the length of own ship, ship's sailing time and sailing routes affect collision risks. The developed system is expected to be helpful for navigators to choose the optimum safe route before sailing.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

Effective indexing of moving objects for current position management in Road Networks (도로 네트워크 환경에서 이동 객체의 현재 위치 관리를 위한 효율적인 색인 기법)

  • Kim, Tae-Gyu;Shin, Soong-Sun;Chung, Weo-Nil;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.33-43
    • /
    • 2011
  • Recently, advances in mobile communication and location identifying technology of the moving object is evolving. Therefore, the location-based services based on request for service have increased and a variety of the indexing for the position management of moving objects has been studied. Because the index based on Euclidean space are no restriction of movement, it is difficult to apply to the real world. Also, there is additional cost to find adjacent road segments in road networks-based indexing. Existing studies of fixed static objects such as buildings or hospitals are not considered. In this paper, we propose an efficient road networks-based indexing for management of current positions. The proposed indexing partitions road networks by grids and has integrated road connection informations and manage separated extra indexing for fixed static objects. Through the experiment, we show that the proposed indexing based on road networks improves the performance of operation for search or update than existing indexing.

A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection (파일 DNA 기반의 변종 악성코드 탐지를 위한 유사도 비교에 관한 연구)

  • Jang, Eun-Gyeom;Lee, Sang Jun;Lee, Joong In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.85-94
    • /
    • 2014
  • This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was applied to defend against zero day attack and to minimize false detection, by remedying weaknesses of the conventional network-based packet detection technique and process-based detection technique. For the file DNA-based detection technique, abnormal behaviors of malware were splitted into network-related behaviors and process-related behaviors. This technique was employed to check and block crucial behaviors of process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which process behaviors and network behaviors are mixed, and to deal with it rapidly through hazard warning and cut-off.

Development of a Real-time Simulation Technique for Cyber-physical System (사이버 물리 시스템을 위한 실시간 시뮬레이션 기술 개발)

  • Kim, Jiyeon;Kim, Hyung-Jong;Kang, Sungjoo
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.181-188
    • /
    • 2014
  • Heterogeneous physical systems and computational devices are incorporated on a large-scale in a CPS (cyber-physical system) environment. Simulations can be useful for the reliable behaviors of CPSs. Time synchronization is one of major technical issues for the simulations. In the CPS, distributed systems control themselves by interacting with each other during runtime. When some simulation models have high complexity, wrong control commands as well as incorrect data can be exchanged due to the time error. We propose a time synchronization algorithm for the hybrid model that has characteristics of both continuous time systems and discrete event systems. In addition, we develop a CPS simulator based on our algorithm. For the verification of the algorithm and the execution of the simulator, we develop an example hybrid model and simulate considering user controls as well as interactions among the distributed systems.