• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.025 seconds

A New CSR-DCF Tracking Algorithm based on Faster RCNN Detection Model and CSRT Tracker for Drone Data

  • Farhodov, Xurshid;Kwon, Oh-Heum;Moon, Kwang-Seok;Kwon, Oh-Jun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.12
    • /
    • pp.1415-1429
    • /
    • 2019
  • Nowadays object tracking process becoming one of the most challenging task in Computer Vision filed. A CSR-DCF (channel spatial reliability-discriminative correlation filter) tracking algorithm have been proposed on recent tracking benchmark that could achieve stat-of-the-art performance where channel spatial reliability concepts to DCF tracking and provide a novel learning algorithm for its efficient and seamless integration in the filter update and the tracking process with only two simple standard features, HoGs and Color names. However, there are some cases where this method cannot track properly, like overlapping, occlusions, motion blur, changing appearance, environmental variations and so on. To overcome that kind of complications a new modified version of CSR-DCF algorithm has been proposed by integrating deep learning based object detection and CSRT tracker which implemented in OpenCV library. As an object detection model, according to the comparable result of object detection methods and by reason of high efficiency and celerity of Faster RCNN (Region-based Convolutional Neural Network) has been used, and combined with CSRT tracker, which demonstrated outstanding real-time detection and tracking performance. The results indicate that the trained object detection model integration with tracking algorithm gives better outcomes rather than using tracking algorithm or filter itself.

The Role of Investment Attraction in Vietnamese Industrial Parks and Economic Zones in the Process of International Economic Integration

  • Dzung, Nguyen Tien;Tuan, Nguyen Anh;Tinh, Do Phu Tran
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.3
    • /
    • pp.27-34
    • /
    • 2017
  • This study aims to assess the attraction of foreign direct investment in Vietnamese economic zones (including industrial zones and economic zones). The main research method used are synthesis and comparison analysis based on the data collected from the surveyed group comprising of enterprises operating in the economic zones in the Middle (Chu Lai, Nhon Hoi, Dung Quat) and the Southern (the largest island: Phu Quoc). After conducting surveys, research results show that there is a difference between the assessment and the level to meet the requirements of investors with business environment, expressed through the following criteria: (1) the infrastructure; (2) quality of public services; (3) preferential policies; (4) labor; (5) market; and (6) social services. Based on the assessment of the identified criteria, this paper had suggested six number of recommendations to promote the role of attracting foreign direct investment capital into the economic zones in Vietnam: (1) implementing the "one-stop-shop" policy; (2) continuing to improve the infrastructure of economic zones; (3) prevent and ensure the security of economic zones; (4) implementing vocational training activities to improve quality of human resources; (5) development of supporting industries; (6) raising the quality of capital invested in the economic zone.

A Study on Informational(IT) Integration Model for Efficiency of National Police Agency Business (경찰청 업무의 효율성을 위한 정보화(IT) 통합 모델 연구)

  • Shin, Sung-Choul;Yang, Hae-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.203-212
    • /
    • 2008
  • Currently the problem that cannot attempt convenience anger to inner user and people has been stated in a National Police Agency(NPA) informatization system administered Executed an inquiry regarding users inner the our country NPA after analyzing Hint point a foreign NPA IT informatization organization decreasing by and analyzed improvement Point to measures regarding this problem at these papers, and derived from an efficient strategic plan for NPA informatization integration. As set up informatization vision of NPA and a goal, To utilize so that design a model integrated inforrnatization for advanced a business assistance system of the NPA where these results are objective for the people enhancement, and keep connection with other organization in its mind, and can accomplish a quality elevation of NPA information business. and expect as present improvement plan for efficiency of NPA information business.

  • PDF

Development and Evaluation of 3-Axis Gyro Sensor based Servo motion control (3-Axis Gyro Sensor based on Servo Motion Control 장치의 성능평가기준 및 시험규격개발)

  • Lee, WonBu;Chang, Chulsoon;Kim, JeongKuk;Park, Soohong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.627-630
    • /
    • 2009
  • The combination of the marine use various multi sensor surveillance system technology with the development of servo motion control algorithm and gyro sensor in six freedom motion is implemented to analyze the movement response. The stabilization of the motion control is developed and Nano driving Precision Pan-Tilt/Gimbal system is obtained from the security positioning cameras with ultra high speed device is used to carry out the exact behavior of the device. The exact behavior will be used to make a essential equipment. Finally the development of the Nano Driving Multi Sensor, Nano of Surveillance System Driving Precision Pan-Tilt/Gimbal optimal design and production, 3-aix Gyro Sensor based with Servo Motion Control algorithm development, Image trace video software and hardware tracking the development is organized and discuss in details. The development of the equipment and the system integration are fully experimented and verified.

  • PDF

Mark XIIA(Mode 5) IFF System Integration and Certification Test for Surface to Air Missile System (유도무기체계 모드 5 피아식별 체계통합 및 인증시험)

  • Kim, Woo-Hyun;Jung, Se-Young;Lee, Yun-Soo;Chang, Se-Myong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • The new IFF mode, Mode-5 replacing Mode-4, has already been established by the US DoD for its allies and NATO forces. A IFF retrofit program for replacing the Mark XII Mode-4 with Mark XIIA Mode-5 is in progress in order to overcome the security limitations of the former in R.O.K. IFF certification test for the new mode, Mode-5, has been performed on medium range surface to air missile platform of the Korean armed forces for the first time in R.O.K and this is regarded as a monumental event in Korean defense industry. The present paper is a discussion on the procedures applied to the IFF system retrofit and integration, lessons learned from AIMS test with the US AIMS PO as observer. The minimum modification from the existing Mark XII Mode-4 to Mark XIIA Mode-5 and evolutional adaption from previous design including interoperability are required for the system retrofit. Letter of Certification was received from the US AIMS PO after the tests. The authors propose that the lessons learned and know-how acquired during the tests are managed by the R.O.K Government as the standard structure of a database. It is expected that the use of the database will reduce the developmental difficulties and risk, also increase efficiency in future developments and other projects.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Design and Implementation of an Access Control System Based on GeoXACML (GeoXACML 기반의 접근 제어 시스템 설계 및 구현)

  • Ban, Hyun O;Shin, In Su;Kim, Jeong Joon;Han, Ki Joon
    • Spatial Information Research
    • /
    • v.21 no.4
    • /
    • pp.15-24
    • /
    • 2013
  • Recently, as the spatial information and various multimedia are fused together, the demand for the high value-added spatial information contents and the necessity of technology for spatial information security are increasing. However, since the current security policy is being managed independently by each system, there is a problem with unreliable or costly to modify or revise the security policy. Such problems occur frequently in the process of coordination or integration of the spatial information management systems that are used in public institutions and private companies. Therefore, in this paper, the access control system that could provide an integrated security policy for many spatial platforms and systems with expandable grammar and semantics was designed and implemented based on GeoXACML proposed by OGC. As the GeoXACML-based access control system designed and implemented in this paper follows the international standard specifications, it provides high portability and interoperability. Finally, in this paper, the efficiency of the system was proved by applying it to a virtual scenario on the military area requiring the access control.

Changing Political-Economic Geography of Energy Flows Northeast Asia (변화하는 동북아시아 에너지 흐름의 정치경제지리)

  • Choi, Byung-Doo
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.4
    • /
    • pp.475-495
    • /
    • 2006
  • This paper is to analyse a changing space of energy flows in Northeast Asia from geopolitical and geoeconomic perspectives that have been recently promoted for energy security of countries in this region. The research is based on an analytical framework in an integration of political ecology and political economy. Because of an ever-increasing input of energy resources for economic growth and of dramatically increasing price of crude oil and recent instability of oil market, South Korea, China and Japan have been deeply concerned with energy security and conducted very actively geopolitical strategies. And hence the space of energy flows in the region is now in a process of dynamic reconfiguration, in which the project for development of oil and natural gas fields in East Siberia and construction of pipelines to transport them can be seen as one of competitive issues among these countries. In spite of worrying about stagflation due to rapid increase of oil price, such geo-strategies for energy security and reconfiguration of space of energy flows seem to keep the accumulation of capital in this region continue with generation of huge privatized oil companies.

  • PDF

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

The appropriate amount of Defense budget for stabilizing National security in Northeast Asia (동북아지역의 안보균형을 위한 적정수준 국방비 분석에 관한 연구)

  • Lee, Wol-Hyeong;Kim, Hyung Jae
    • International Area Studies Review
    • /
    • v.20 no.1
    • /
    • pp.277-295
    • /
    • 2016
  • It is undoubtedly true that national security in Korean peninsula is on the road to destabilization. The main factors are known to be North Korea's development and experiment on nuclear arms, especially the forth nuclear experiment on January 6th, ICBM launch February 7th, and encroachment upon the territory the NLL on the 8th along with the shutdown on Gaeseong Industrial Complex. Also, China's trouble with other nations over sovereignty over islands in the South China Sea and the fact that Japan's government is veering to the right side and having territorial dispute are making the case worse. Nations in Northeast Asia are striving to obtain the interest for the sake of their own country. In order to do so, they're walking the path to achieve national security. Until then, they are not so willing to participate foreign matters or economical race. Even in our perspective, these issues are many of the main problems which our country is currently facing. However, it is important for them to avoid making policies which may take away the citizen's happiness. The number one priority for the nation or any form of a group is to act in the best interest for the national security and the citizen's happiness. They are the main factors why a nation could exist. They are the symbols of a nation's sovereign authority. Countries outside are proving it by increasing their national defense budget even in this unprecedented economical crisis. If we are willing to stay the same as ever, the disparity in the military force will not be the same in the future. In conclusion, the study examines the problem which changes in Northeast Asia's defense environment could bring and the appropriate amount of national defense budget in order to support the nation's integration of its abilities to move toward South and North Korea's unification.