• 제목/요약/키워드: Security Technique

검색결과 1,691건 처리시간 0.028초

Back-Propagation Neural Network Based Face Detection and Pose Estimation (오류-역전파 신경망 기반의 얼굴 검출 및 포즈 추정)

  • Lee, Jae-Hoon;Jun, In-Ja;Lee, Jung-Hoon;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • 제9B권6호
    • /
    • pp.853-862
    • /
    • 2002
  • Face Detection can be defined as follows : Given a digitalized arbitrary or image sequence, the goal of face detection is to determine whether or not there is any human face in the image, and if present, return its location, direction, size, and so on. This technique is based on many applications such face recognition facial expression, head gesture and so on, and is one of important qualify factors. But face in an given image is considerably difficult because facial expression, pose, facial size, light conditions and so on change the overall appearance of faces, thereby making it difficult to detect them rapidly and exactly. Therefore, this paper proposes fast and exact face detection which overcomes some restrictions by using neural network. The proposed system can be face detection irrelevant to facial expression, background and pose rapidily. For this. face detection is performed by neural network and detection response time is shortened by reducing search region and decreasing calculation time of neural network. Reduced search region is accomplished by using skin color segment and frame difference. And neural network calculation time is decreased by reducing input vector sire of neural network. Principle Component Analysis (PCA) can reduce the dimension of data. Also, pose estimates in extracted facial image and eye region is located. This result enables to us more informations about face. The experiment measured success rate and process time using the Squared Mahalanobis distance. Both of still images and sequence images was experimented and in case of skin color segment, the result shows different success rate whether or not camera setting. Pose estimation experiments was carried out under same conditions and existence or nonexistence glasses shows different result in eye region detection. The experiment results show satisfactory detection rate and process time for real time system.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • 제34권1호
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • 제17권2호
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

Environmental Impact Assessment of Agricultural Systems Using the Life Cycle Assessment (전과정평가 도입을 통한 농업환경영향 평가)

  • Shim, Kyo-Moon;Jeong, Ji-Sun;So, Kyu-Ho;Lim, Song-Tak;Roh, Kee-An;Kim, Gun-Yeob;Jeong, Hyun-Cheol;Lee, Deog-Bae
    • Korean Journal of Soil Science and Fertilizer
    • /
    • 제43권2호
    • /
    • pp.237-241
    • /
    • 2010
  • Many policies have been implemented to mitigate the greenhouse gases in atmosphere overall of sectors. With considering the distinct characteristics of the food security, agricultural sector is no exception to this situation. To this regard, total amount of carbon which is emitted through all of the agricultural production process is calculated, and being based on this result, the demand for the introduction of agricultural production system with low carbon has been rising. Case studies on the application of life cycle assessment (LCA) technique to agricultural sector are found in many countries. For example, life cycle inventory (LCI) data bases of crop, farm infrastructure, fertilizer, farm machinery, and etc., have been constructed and provided by Ecoinvent (Swiss centre for life cycle inventories) of Swiss. In Japan, Top-down typed LCA methodology for agriculture is developed based on the inter-industry analysis, and is evaluated according to the productive method of crop. On the other hand, environmental impact assessment of agricultural system using LCA in Korea is just in the beginning stages. So it is required to assess environmental impact on agricultural fertilizer and pesticide, and to develop their flow modeling, and methodology of LCA of agricultural sector. Environmental impact assessment on agricultural materials, machinery, and infrastructure will also be carried out.

Development of an Imaging-DOAS System for 2-D Remote Sensing of Atmospheric Gases (대기가스오염물질의 이차원 원격 모니터링을 위한 Imaging-DOAS 개발)

  • Lee, Han-Lim;Lee, Chul-Kyu;Jung, Jin-Sang;Park, Jeong-Eun;Kim, Young-Joon
    • Journal of Korean Society of Environmental Engineers
    • /
    • 제28권2호
    • /
    • pp.150-157
    • /
    • 2006
  • Spatially resolved remote identification and quantification of trace gases in the atmosphere is desirable in various fields of scientific research as well as in public security and industrial contexts. Environmental observations investigating causes, extent md consequences of air pollution are of fundamental interest. We present an Imaging-DOAS system, a ground based remote sensing instrument that allows spatially resolved mapping of atmospheric trace gases by a differential optical absorption spectroscopy(DOAS) with sun scattered light as the light source. A passive DOAS technique permits the identification and quantification of various gases, e.g., $NO_2,\;SO_2,\;and\;CH_2O$, from their differential absorption structures with high sensitivity. The Imaging-DOAS system consists of a scanning mirror, a focusing lens, a spectrometer, a 2-D CCD, ad the integral control software. An imaging spectrometer simultaneously acquires spectral information on the incident light in one spatial dimension(column) and sequentially scans the next spatial dimension with a motorized scanning mirror. The structure of the signal acquisition system is described in detail and the evaluation method is also briefly discussed. Applications of imaging of the $NO_2$ contents in the exhaust plumes from a power plant are presented.

A Study on the Improving Management Method for the Small Projects Applying Senior Construction Engineer (고령 건설기술자를 활용한 소규모공사의 공사관리방법 개선에 관한 연구)

  • Song Jin-Woo;Lee Sang-Beom
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 한국건설관리학회 2004년도 제5회 정기학술발표대회 논문집
    • /
    • pp.305-310
    • /
    • 2004
  • The building below standard scales to be built only by constructive report to authorities. Construction law 8 illustrates that supervision should be deployed in all the construction sites at the building which is found to have more than 3 floors and also to have more than $200m^2$ of total squares in especially outside area of city plan zone. Such a small construction is have a important and the most basic meaning. Many problems were found to occur in all the constructive places which were out of the limit of this law. The construction sites were found to be controlled by public official's visiting without supervisors and designers of architecture. Technique of construction in architecture was found to be not different from that of 1980. The security of employees in construction on sites has a serious problem. Because of choosing all the materials of the building without a reasonable point. All the building were found to have a law material about inside and outside aspects. The purpose of this study are to examine existing law about a small project and than to analyze the situation of constructive control through questionnaires and interviews with all the supervisors. Based on the data base of engineers who had a great experience in construction sites, The purpose of this study is also to suggest and advise the method of controlling all the items in architecture through on and off line.

  • PDF

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • 제48권6호
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

Low Power Implementation of Integrated Cryptographic Engine for Smart Cards (스마트카드 적용을 위한 저전력 통합 암호화 엔진의 설계)

  • Kim, Yong-Hee;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • 제45권6호
    • /
    • pp.80-88
    • /
    • 2008
  • In this paper, the block cipher algorithms, 3-DES(Triple Data Encryption Standard), AES(Advanced Encryption Standard), SEED, HASH(SHA-1), which are domestic and international standards, have been implemented as an integrated cryptographic engine for smart card applications. For small area and low power design which are essential requirements for portable devices, arithmetic resources are shared for iteration steps in each algorithm, and a two-level clock gating technique was used to reduce the dynamic power consumption. The integrated cryptographic engine was verified with ALTERA Excalbur EPXA10F1020C device, requiring 7,729 LEs(Logic Elements) and 512 Bytes ROM, and its maximum clock speed was 24.83 MHz. When designed by using Samsung 0.18 um STD130 standard cell library, the engine consisted of 44,452 gates and had up to 50 MHz operation clock speed. It was estimated to consume 2.96 mW, 3.03 mW, 2.63 mW, 7.06 mW power at 3-DES, AES, SEED, SHA-1 modes respectively when operating at 25 MHz clock. We found that it has better area-power optimized structure than other existing designs for smart cards and various embedded security systems.

Status of research on the sweetpotato biotechnology and prospects of the molecular breeding on marginal lands (고구마 생명공학연구 현황과 조건 불리지역 분자육종 전망)

  • Kim, Ho Soo;Yoon, Ung-Han;Lee, Chan-Ju;Kim, So-Eun;Ji, Chang Yoon;Kwak, Sang-Soo
    • Journal of Plant Biotechnology
    • /
    • 제45권3호
    • /
    • pp.196-206
    • /
    • 2018
  • Dramatic increase in global population accompanied by rapid industrialization in developing countries has led to serious environmental, food, energy, and health problems. The Food and Agriculture Organization of the United Nations has estimated world population will increase to 9.7 billion by 2050 and require approximately 1.7 times more food, and more than 3.5 times energy than that of today. Particularly, sweetpotato is easy to cultivate in unfavorable conditions such as heat, drought, high salt, and marginal lands. In this respect, sweetpotato is an industrially valuable starch crop. To replace crops associated with these food and energy problems, it is necessary to develop new crops with improved nutrients and productivity, that can be grown on marginal lands, including desertification areas using plant biotechnology. For this purpose, exploring useful genes and developing genetically modified crops are essential strategies. Currently, sweetpotato [Ipomoea batatas (L.) Lam.] have been re-evaluated as the best health food and industrial crop that produces starch and low molecular weight antioxidants, such as vitamin A, vitamin E, anthocyanins and carotenoids. This review will focus on the current status of research on sweetpotato biotechnology on omics including genome sequencing, transcriptome, proteomics and molecular breeding. In addition, prospects on molecular breeding of sweetpotato on marginal lands for sustainable development were described.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • 제21권1호
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.