• Title/Summary/Keyword: Security Detection

Search Result 2,046, Processing Time 0.026 seconds

Calibration and Validation Activities for Earth Observation Mission Future Evolution for GMES

  • LECOMTE Pascal
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.237-240
    • /
    • 2005
  • Calibration and Validation are major element of any space borne Earth Observation Mission. These activities are the major objective of the commissioning phases but routine activities shall be maintained during the whole mission in order to maintain the quality of the product delivered to the users or at least to fully characterise the evolution with time of the product quality. With the launch of ERS-l in 1991, the European Space Agency decided to put in place a group dedicated to these activities, along with the daily monitoring of the product quality for anomaly detection and algorithm evolution. These four elements are all strongly linked together. Today this group is fully responsible for the monitoring of two ESA missions, ERS-2 and Envisat, for a total of 12 instruments of various types, preparing itself for the Earth Explorer series of five. other satellites (Cryosat, Goce, SMOS, ADM-Aeolus, Swarm) and at various levels in past and future Third Party Missions such as Landsat, J-ERS, ALOS and KOMPSAT. The Joint proposal by the European Union and the European Space Agency for a 'Global Monitoring for Environment and Security' project (GMES), triggers a review of the scope of these activities in a much wider framework than the handling of single missions with specific tools, methods and activities. Because of the global objective of this proposal, it is necessary to put in place Multi-Mission Calibration and Validation systems and procedures. GMES Calibration and Validation activities will rely on multi source data access, interoperability, long-term data preservation, and definition standards to facilitate the above objectives. The scope of this presentation is to give an overview of the current Calibration and Validation activities at ESA, and the planned evolution in the context of GMES.

  • PDF

Bursoscopic Evaluation for Degree of the Rotator Cuff Tear with Air Infusion Method (공기 주입과 동시에 시행한 견봉하 관절경 술식을 이용한 회전근개 파열의 정도 평가)

  • Moon, Young-Lae;Sohn, Hong-Moon;Kim, Nam-Hyung
    • Journal of the Korean Arthroscopy Society
    • /
    • v.6 no.2
    • /
    • pp.126-130
    • /
    • 2002
  • Purpose : To evaluate the diagnostic efficiency of the subacromial bursoscopy with glenohumeral air infusion technique for detection of the full thickness tear which we used to think as a partial thickness tear, because it was hidden by bursal tissue. Materials and methods : We chose 65 cases and divided them into 2 groups. The group I was 18 cases with partial thickness rotator cuff tears on glenohumeral arthroscopic evaluation, and the group 2 was 37 cases with full thickness rotator cuff tears which were repaired. We inflated the glenohumeral Joint with 50-100ml of air and observed air bubble leakage simultaneously on bursoscopy. Results : In group I, we could detect air leakage in 3 cases and found that it was full thickness tear. In group II, 2 cases revealed too much air leakage proved that it was incomplete repair and was in need of additional suture. Conclusion : Air infusion technique is though to be a valuable method in differentiation between the partial and full thickness tear and for evaluation of the security of the repair.

  • PDF

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

Optimal Surveillance Trajectory Planning for Illegal UAV Detection for Group UAV using Particle Swarm Optimization (불법드론 탐지를 위한 PSO 기반 군집드론 최적화 정찰궤적계획)

  • Lim, WonHo;Jeong, HyoungChan;Hu, Teng;Alamgir, Alamgir;Chang, KyungHi
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.5
    • /
    • pp.382-392
    • /
    • 2020
  • The use of unmanned aerial vehicle (UAV) have been regarded as a promising technique in both military and civilian applications. Nevertheless, due to the lack of relevant and regulations and laws, the misuse of illegal drones poses a serious threat to social security. In this paper, aiming at deriving the three-dimension optimal surveillance trajectories for group monitoring drones, we develop a group trajectory planner based on the particle swarm optimization and updating mechanism. Together, to evaluate the trajectories generated by proposed trajectory planner, we propose a group-objectives fitness function in accordance with energy consumption, flight risk. The simulation results validate that the group trajectories generated by proposed trajectory planner can preferentially visit important areas while obtaining low energy consumption and minimum flying risk value in various practical situations.

Performance Comparison of Wave Information Retrieval Algorithms Based on 3D Image Analysis Using VTS Sensor (VTS 센서를 이용한 3D영상 분석에 기초한 파랑 정보 추출 알고리즘 성능 비교)

  • Ryu, Joong-seon;Lim, Dong-hee;Kim, Jin-soo;Lee, Byung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.519-526
    • /
    • 2016
  • As marine accidents happen frequently, it is required to establish a marine traffic monitoring system, which is designed to improve the safety and efficiency of navigation in VTS (Vessel Traffic Service). For this aim, recently, X-band marine radar is used for extracting the sea surface information and, it is necessary to retrieve wave information correctly and provide for the safe and efficient movement of vessel traffic within the VTS area. In this paper, three different current estimation algorithms including the classical least-squares (LS) fitting, a modified iterative least-square fitting routine and a normalized scalar product of variable current velocities are compared with buoy data and then, the iterative least-square method is modified to estimate wave information by improving the initial current velocity. Through several simulations with radar signals, it is shown that the proposed method is effective in retrieving the wave information compared to the conventional methods.

A Monitoring System for Working Environments Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 작업환경 모니터링 시스템)

  • Jung, Sang-Joon;Chung, Youn-Ky
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1478-1485
    • /
    • 2009
  • A sensor network which is composed of a large number of sensors that perform various sensing is applied in a variety of fields. The sensor networks can be widely used for various application area like as home automation, fire detection and security area. Development of new sensor to have appropriate functions and deployment of networks for suitable application are served actively. In this paper, we design and implement a system that monitors various factory facilities by deploying sensor network at a working place which threatens the worker's safety. A sensor node reports its sensing data like as temperature and humidity to monitor facilities to a sink node. And the server which is connect to the sink node gathers and provides information by user interface. In addition, digital data which are generated at a work place can be transferred via the sensor network to increase the efficiency of works. The proposed sensor network provides the convenience of working, since it is deployed at a garbage collection company to monitor a temperature and humidity of garbage and to transmit data about the weight of trucks which enters the company.

  • PDF

Approximate Front Face Image Detection Using Facial Feature Points (얼굴 특징점들을 이용한 근사 정면 얼굴 영상 검출)

  • Kim, Su-jin;Jeong, Yong-seok;Oh, Jeong-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.675-678
    • /
    • 2018
  • Since the face has a unique property to identify human, the face recognition is actively used in a security area and an authentication area such as access control, criminal search, and CCTV. The frontal face image has the most face information. Therefore, it is necessary to acquire the front face image as much as possible for face recognition. In this study, the face region is detected using the Adaboost algorithm using Haar-like feature and tracks it using the mean-shifting algorithm. Then, the feature points of the facial elements such as the eyes and the mouth are extracted from the face region, and the ratio of the two eyes and degree of rotation of the face is calculated using their geographical information, and the approximate front face image is presented in real time.

  • PDF

The Study on Implementation of Crime Terms Classification System for Crime Issues Response

  • Jeong, Inkyu;Yoon, Cheolhee;Kang, Jang Mook
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.61-72
    • /
    • 2020
  • The fear of crime, discussed in the early 1960s in the United States, is a psychological response, such as anxiety or concern about crime, the potential victim of a crime. These anxiety factors lead to the burden of the individual in securing the psychological stability and indirect costs of the crime against the society. Fear of crime is not a good thing, and it is a part that needs to be adjusted so that it cannot be exaggerated and distorted by the policy together with the crime coping and resolution. This is because fear of crime has as much harm as damage caused by criminal act. Eric Pawson has argued that the popular impression of violent crime is not formed because of media reports, but by official statistics. Therefore, the police should watch and analyze news related to fear of crime to reduce the social cost of fear of crime and prepare a preemptive response policy before the people have 'fear of crime'. In this paper, we propose a deep - based news classification system that helps police cope with crimes related to crimes reported in the media efficiently and quickly and precisely. The goal is to establish a system that can quickly identify changes in security issues that are rapidly increasing by categorizing news related to crime among news articles. To construct the system, crime data was learned so that news could be classified according to the type of crime. Deep learning was applied by using Google tensor flow. In the future, it is necessary to continue research on the importance of keyword according to early detection of issues that are rapidly increasing by crime type and the power of the press, and it is also necessary to constantly supplement crime related corpus.

Walking Assistance System for Visually Impaired People using Vultiple sensors (다중 센서를 이용한 시각장애인 보행 보조 시스템)

  • Park, Hye-Bin;Ko, Yong-Jin;Lee, Seung-Min;Jang, Ji-Hoon;Lee, Boong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.4
    • /
    • pp.533-538
    • /
    • 2017
  • In this thesis, the ambulatory aid mechanism was implemented so that blind people could be safer at risk of walking outdoors. Using ultrasonic sensors, the obstacles can be detected when the distance between the obstacle is within 50 cm of the obstacle. If the light sensor becomes less than 25 lux, the LED will automatically turn on and help the safety of the visually impaired and the security of sight of the peripheral walkers. Color recognition sensors increase the rate of recognition of yellow color by the detection distance is 1cm, it vibrated when yellow light was detected. Using GPS with 7.3 m of error range, the guardian was able to check the location of the visually impaired.