• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.034 seconds

Development and Evaluation of 3-Axis Gyro Sensor based Servo motion control (3-Axis Gyro Sensor based on Servo Motion Control 장치의 성능평가기준 및 시험규격개발)

  • Lee, WonBu;Chang, Chulsoon;Kim, JeongKuk;Park, Soohong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.627-630
    • /
    • 2009
  • The combination of the marine use various multi sensor surveillance system technology with the development of servo motion control algorithm and gyro sensor in six freedom motion is implemented to analyze the movement response. The stabilization of the motion control is developed and Nano driving Precision Pan-Tilt/Gimbal system is obtained from the security positioning cameras with ultra high speed device is used to carry out the exact behavior of the device. The exact behavior will be used to make a essential equipment. Finally the development of the Nano Driving Multi Sensor, Nano of Surveillance System Driving Precision Pan-Tilt/Gimbal optimal design and production, 3-aix Gyro Sensor based with Servo Motion Control algorithm development, Image trace video software and hardware tracking the development is organized and discuss in details. The development of the equipment and the system integration are fully experimented and verified.

  • PDF

Performance Comparison for Exercise Motion classification using Deep Learing-based OpenPose (OpenPose기반 딥러닝을 이용한 운동동작분류 성능 비교)

  • Nam Rye Son;Min A Jung
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.59-67
    • /
    • 2023
  • Recently, research on behavior analysis tracking human posture and movement has been actively conducted. In particular, OpenPose, an open-source software developed by CMU in 2017, is a representative method for estimating human appearance and behavior. OpenPose can detect and estimate various body parts of a person, such as height, face, and hands in real-time, making it applicable to various fields such as smart healthcare, exercise training, security systems, and medical fields. In this paper, we propose a method for classifying four exercise movements - Squat, Walk, Wave, and Fall-down - which are most commonly performed by users in the gym, using OpenPose-based deep learning models, DNN and CNN. The training data is collected by capturing the user's movements through recorded videos and real-time camera captures. The collected dataset undergoes preprocessing using OpenPose. The preprocessed dataset is then used to train the proposed DNN and CNN models for exercise movement classification. The performance errors of the proposed models are evaluated using MSE, RMSE, and MAE. The performance evaluation results showed that the proposed DNN model outperformed the proposed CNN model.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Highly dispersive substitution box (S-box) design using chaos

  • Faheem, Zaid Bin;Ali, Asim;Khan, Muhamad Asif;Ul-Haq, Muhammad Ehatisham;Ahmad, Waqar
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.619-632
    • /
    • 2020
  • Highly dispersive S-boxes are desirable in cryptosystems as nonlinear confusion sublayers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S-box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S-box. The proposed scheme is vetted using well-established cryptographic performance criteria. The proposed S-box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S-box is also tested using an image encryption algorithm. Results show that the proposed S-box as a confusion component entails a high level of security and improves resistance against all known attacks.

Numerical Simulation on Seepage and Seismic Behaviors of Poorly-Compacted Raised Reservoir Levee (다짐시공이 불량한 증고 저수지 제체의 침투 및 동적거동 해석)

  • Lee, Chung-Won;Park, Sung-Yong;Oh, Hyeon-Mun;Kim, Yong-Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.57 no.4
    • /
    • pp.85-99
    • /
    • 2015
  • It is urgent to redevelop the superannuated reservoir levee through the levee raising for countermeasure to climate change and improvement of storage capacity of reservoir. However, low compaction degree of the raised reservoir levee owing to poor construction condition leads to degradation of the stability of the reservoir levee on seepage and earthquake. In this study, seepage and seismic behavior of raised reservoir levee with low compaction degree was evaluated through numerical simulation. From the simulated results, water level raising possibly induces crack and/or sinkhole on the surface of the poorly-compacted raised reservoir levee owing to the increase of the subsidences at the crown and the front side of that. In addition, relatively larger displacement and acceleration response at the front side of raised reservoir levee in seismic condition may degrade overall stability of reservoir levee. Therefore, reasonable construction management for the compaction of the raised reservoir levee is required for ensuring long-term stability on seepage and earthquake.

Characteristics of Electric-Power Use in Residential Building by Family Composition and Their Income Level (거주자 구성유형 및 소득수준에 따른 주거용 건물 내 전력소비성향)

  • Seo, Hyun-Cheol;Hong, Won-Hwa;Nam, Gyeong-Mok
    • Journal of the Korean housing association
    • /
    • v.23 no.6
    • /
    • pp.31-38
    • /
    • 2012
  • In this paper, we draws tendency of the electricity consumption in residential buildings according to inhabitants Composition types and the level of incomes. it is necessary to reduce energy cost and keep energy security through the electricity demand forecasting and management technology. Progressive social change such as increases of single household, the aging of society, increases in the income level will replace the existing residential electricity demand pattern. However, Only with conventional methods that using only the energy consumption per-unit area are based on Energy final consumption data can not respond to those social and environmental change. To develop electricity demand estimation model that can cope flexibly to changes in the social and environmental, In this paper researches propensity of electricity consumption according to the type of residents configuration, the level of income. First, we typed form of inhabitants in residential that existed in Korea. after that we calculated hourly electricity consumption for each type through National Time-Use Survey performed at the National Statistical Office with considering overlapping behavior. Household appliances and retention standards according to income level is also considered.

A risk analysis of step-down equity-linked securities based on regime-switching copula

  • Nguyen, Manh Duc;Ko, Bangwon;Kwon, Hyuk-Sung
    • Communications for Statistical Applications and Methods
    • /
    • v.27 no.1
    • /
    • pp.79-95
    • /
    • 2020
  • The globalization of financial markets has broadened investment opportunities. International investors' investment portfolios consist of financial instruments from various countries; consequently, the risks associated with economic dependence among countries should be carefully considered. Step-down equity-linked securities (ELS) are a structured financial product that have recently become popular among Korean investors. Payoffs are based on two or three stock indices from different regions; therefore, dependence between the indices should be reflected in the risk analysis. In this study, we consider a regime-switching copula model to describe the joint behavior of two stock indices- the Eurostoxx50 and the Hang Seng China Enterprises Index (HSCEI). These indices are commonly used as underlying assets of step-down ELS. Using historical data, we analyze the risk associated with step-down ELS through the probabilities of early redemption. A regime-switching copula model can accommodate complicated dependence. Thus, it should be considered in the risk analysis of step-down ELS.

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

A Study of Low Back Pain Patient's Satisfaction with Physical Therapist in Seoul and Uijongbu City (요통환자의 물리치료사 만족도에 대한 조사 -서울 및 의정부 시 일부 병, 의원에 내원하는 외래, 재진 환자를 중심으로-)

  • Oh Seung-Kil
    • The Journal of Korean Physical Therapy
    • /
    • v.9 no.1
    • /
    • pp.37-50
    • /
    • 1997
  • Low back Pain(LBP) is a common problem, and the resulting disability frequently contains nonorganic, psycho-logical and social elements that are difficult for the physical therapists to manage. The physical therapist-patient relationship is the most important factors in the management of low back pain as chronic disease. The purpose of this study was to evaluate and to identify factors that had influenced low, back pain patients satisfaction with physical therapist The subjects of this study were 223 out-patients(116 males and 107 females) who had been visited to physical therapy room of medical institutions in Seoul and Uijgngbu city. They were examined by the questionaire of Dimatteo and Hays which was amended to serve the purpose of this study by author. The collected data was analyzed by ANOVA according to the purpose of this study. There was no difference with statistic value in LBP patient's satisfaction according to occupation, sex, schooling, religion, marital status, medical security, duration of disease, the tine required, recurrence, but was a difference according to age, income, period of treatment, cost, diagnosis, waiting time, the number of physical therpy's sort, sex ane age of physical therapists (p<.05). LBP patients was satisfied with physical therapist's communicative behavior, but was dissatisfied with physical therapist's competence.

  • PDF

ANALYSIS OF COMPLEMENTED GROUP CA DERIVED FROM 90/150 GROUP CA

  • KWON, MIN-JEONG;CHO, SUNG-JIN;KIM, HAN-DOO;CHOI, UN-SOOK;KONG, GIL-TAK
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.239-247
    • /
    • 2016
  • In recent years, CA has been applied to image security due to its simple and regular structure, local interaction and random-like behavior. Since the initial state is regenerated after some iterations in the group CA, the receiver is able to decrypt by the same CA. Pries et al. showed that the all lengths of the cycles in the complemented group CA C with rules 195, 153, and 51 are equal to the order of C. Nandi et al. reported the encryption technique using C. These results can be made efficient use in cryptosystem by expanding the Nandi's key space. In this paper, we analyze the order of the complemented group CA derived from 90=150 group CA and show that all the lengths of the cycles in the complemented CA are equal to the order of the complemented CA.