• Title/Summary/Keyword: Tracking-by-Detection

Search Result 797, Processing Time 0.032 seconds

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Visible Light Communication Based Wide Range Indoor Fine Particulate Matter Monitoring System (가시광통신 기반 광역 실내 초미세먼지 모니터링 시스템)

  • Shakil, Sejan Mohammad Abrar;An, Jinyoung;Han, Daehyun;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.1
    • /
    • pp.16-23
    • /
    • 2019
  • Fine particulate matter known as PM 2.5 refers to the atmospheric particulate matter that has a diameter less than 2.5 micrometer identified as dangerous element for human health and its concentration can provide us a clear picture about air dust concentration. Humans stay indoor almost 90% of their life time and also there is no official indoor dust concentration data, so our study is focused on measuring the indoor air quality. Indoor dust data monitoring is very important in hospital environments beside that other places can also be considered for monitoring like classrooms, cements factories, computer server rooms, petrochemical storage etc. In this paper, visible light communication system is proposed by Manchester encoding technique for electromagnetic interference (EMI)-free indoor dust monitoring. Important indoor environment information like dust concentration is transferred by visible light channel in wide range. An average voltage-tracking technique is utilized for robust light detection to eliminate ambient light and low-frequency noise. The incoming light is recognized by a photo diode and are simultaneously processed by a receiver micro-controller. We can monitor indoor air quality in real-time and can take necessary action according to the result.

Web-based Moving Object Tracking by Controlling Pan-Tilt Camera using Motion Detection (움직임 검출의 캠 제어에 의한 웹기반 이동 객체 추적)

  • 박천주;박희정;이재협;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.17-26
    • /
    • 2002
  • In this paper, we suggest a method to acquire the moving object centered video by panning and tilting a camera automatically according to motion vectors calculated by detecting the motion of a moving object on video steam. We create a difference image by estimating the intensity difference at the grid points of neighboring frames. And we detect the motion using both horizontal projection histogram and vertical projection histogram and decide the center of motion part. Then we calculate a new direction and degree of the motion by comparing coordinates at the center of current motion and the center of previous motion. By controling the RCM using these Motion vectors, we can get video stream positioned unwire object on the center of video frame. Through the experiments, we could get a moving object centered video stream continuously arid monitor remotely by implementing sever/client architecture based on the web.

  • PDF

Development of CCTV Cooperation Tracking System for Real-Time Crime Monitoring (실시간 범죄 모니터링을 위한 CCTV 협업 추적시스템 개발 연구)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.546-554
    • /
    • 2019
  • Typically, closed-circuit television (CCTV) monitoring is mainly used for post-processes (i.e. to provide evidence after an incident has occurred), but by using a streaming video feed, machine-based learning, and advanced image recognition techniques, current technology can be extended to respond to crimes or reports of missing persons in real time. The multi-CCTV cooperation technique developed in this study is a program model that delivers similarity information about a suspect (or moving object) extracted via CCTV at one location and sent to a monitoring agent to track the selected suspect or object when he, she, or it moves out of range to another CCTV camera. To improve the operating efficiency of local government CCTV control centers, we describe here the partial automation of a CCTV control system that currently relies upon monitoring by human agents. We envisage an integrated crime prevention service, which incorporates the cooperative CCTV network suggested in this study and that can easily be experienced by citizens in ways such as determining a precise individual location in real time and providing a crime prevention service linked to smartphones and/or crime prevention/safety information.

Comparative Evaluation of Cardiac Output using Echocardiography in Beagle Dogs (비글견에서 심초음파를 이용한 심박출량 측정에 관한 비교 연구)

  • Park, Kitae;Yeon, Seongchan;Lee, Heechun
    • Journal of Veterinary Clinics
    • /
    • v.29 no.5
    • /
    • pp.384-390
    • /
    • 2012
  • Echocardiographic measurements of cardiac output, including the modified Simpson's method, Automated Contour Tracking(ACT) method, and left ventricular outflow method are well described methods of evaluating cardiac function due to its reliability and the benefits of its non-invasive technique in human medicine. The purpose of this study was to evaluate the accuracy of an echocardiography estimate of cardiac output in isoflurane-anesthetized beagle dogs and was to compare the ACT method to the other methods used in measurement of cardiac output. In healthy beagle dogs, cardiac output results by echocardiography estimate methods showed an excellent correlations with those by the thermodilution method (The modified Simpson's method : r = 0.815, $r^2=0.665$, y = 0.434x + 0.311 ; ACT method : r = 0.86, $r^2=0.748$, y = 0.391x + 0.242 ; ventricular outflow method : r = 0.691, $r^2=0.478$, y = 0.593x + 0.242). Among the results obtained, the ACT method showed the highest correlation coefficient. In conclusion, our study demonstrated that echocardiography estimate methods did not prove to be suitable in accurately measuring absolute cardiac output values but showed an excellent correlation with thermodilution method. Therefore, by using the measurement of cardiac output as supplemental data, echocardiography estimate methods can be used for detection and correction of hemodynamic disturbances during emergency and anesthesia in veterinary practice.

Real-time Control of Biological Animal Wastewater Treatment Process and Stability of Control Parameters (생물학적 축산폐수 처리공정의 자동제어 방법 및 제어 인자의 안정성)

  • Kim, W.Y.;Jung, J.H.;Ra, C.S.
    • Journal of Animal Science and Technology
    • /
    • v.46 no.2
    • /
    • pp.251-260
    • /
    • 2004
  • The feasibility and stability of ORP, pH(mV) and DO as a real-time control parameter for SBR process were evaluated in this study. During operation, NBP(nitrogen break point) and NKP(nitrate knee point), which reveal the biological and chemical changes of pollutants, were clearly observed on ORP and pH(mV)-time profiles, and those control points were easily detected by tracking the moving slope changes(MSC). However, when balance of aeration rate to loading rate, or to OUR(oxygen uptake rate), was not optimally maintained, either false NBP was occurred on ORP and DO curves before the appearance of real NBP or specific NBP feature was disappeared on ORP curve. Under that condition, however, very distinct NBP was found on pH(mV)-time profile, and stable detection of that point was feasible by tracking MSC. These results might mean that pH(mV) is superior real-time control parameter for aerobic process than ORP and DO. Meanwhile, as a real-time control parameter for anoxic process, ORP was very stable and more useful parameter than others. Based on these results, a stable real-time control of process can be achieved by using the ORP and pH(mv) parameters in combination rather than using separately. A complete removal of pollutants could be always ensured with this real-time control technology, despite the variations of wastewater and operation condition, as well as an optimization of treatment time and capacity could be feasible.

Investigation of Ring Artifact Using Algebraic Reconstruction Technique (대수적 재구성 기법을 통한 링 아티팩트 조사)

  • Chon, Kwon Su
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.1
    • /
    • pp.65-70
    • /
    • 2018
  • Computed tomography system is widely used on various fields because section image of an object can be acquired. During several step to obtain section image, artifacts by many error factors can be added on the image. Ring artifact induced by the CT system is examined in this study. A test phantom of $512{\times}512$ size was constructed numerically, and the ring artifact was investigated by the algebraic reconstruction technique. The computer program was realized using Visual C++ under the fan beam geometry with projections of 720 and detector pixel of 1,280. The generation of ring artifact was verified by applying different detection efficiency on detector pixels. The ring intensity became large as increasing the ring value, and the ring artifacts were strongly emphasized near the center of the reconstructed image. The ring artifact may be eliminated by tracking the position of ring artifact on the reconstructed image and by calibrating the detector pixel.

Target-free vision-based approach for vibration measurement and damage identification of truss bridges

  • Dong Tan;Zhenghao Ding;Jun Li;Hong Hao
    • Smart Structures and Systems
    • /
    • v.31 no.4
    • /
    • pp.421-436
    • /
    • 2023
  • This paper presents a vibration displacement measurement and damage identification method for a space truss structure from its vibration videos. Features from Accelerated Segment Test (FAST) algorithm is combined with adaptive threshold strategy to detect the feature points of high quality within the Region of Interest (ROI), around each node of the truss structure. Then these points are tracked by Kanade-Lucas-Tomasi (KLT) algorithm along the video frame sequences to obtain the vibration displacement time histories. For some cases with the image plane not parallel to the truss structural plane, the scale factors cannot be applied directly. Therefore, these videos are processed with homography transformation. After scale factor adaptation, tracking results are expressed in physical units and compared with ground truth data. The main operational frequencies and the corresponding mode shapes are identified by using Subspace Stochastic Identification (SSI) from the obtained vibration displacement responses and compared with ground truth data. Structural damages are quantified by elemental stiffness reductions. A Bayesian inference-based objective function is constructed based on natural frequencies to identify the damage by model updating. The Success-History based Adaptive Differential Evolution with Linear Population Size Reduction (L-SHADE) is applied to minimise the objective function by tuning the damage parameter of each element. The locations and severities of damage in each case are then identified. The accuracy and effectiveness are verified by comparison of the identified results with the ground truth data.

A Wireless Sensor Network Systems to Identify User and Detect Location Transition for Smart Home (지능형 주택을 위한 구성원 식별 및 위치 이동 감지 센서 네트워크 시스템)

  • Lee, Seon-Woo;Yang, Seung-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.396-402
    • /
    • 2010
  • The tracking of current location of residents is an essential requirement for context-aware service of smart houses. This paper presents a wireless sensor network system which could detect location transition such as entrance and exit to a room and also identify the user who passed the room, without duty of wearing any sort of tag. We designed new sensor node to solve the problem of short operation lifetime of previous work[1] which has two pyroelectric infrared (PIR) sensors and an ultrasonic sensor, as well as a 2.4 GHz radio frequency wireless transceiver. The proposed user identification method is to discriminate a person based on his/her height by using an ultrasonic sensor. The detection idea of entering/exiting behavior is based on order of triggering of two PIR sensors. The topology of the developed wireless sensor network system is simple star structure in which each sensor node is connected to one sink node directly. We evaluated the proposed sensing system with a set of experiments for three subjects in a model house. The experimental result shows that the averaged recognition rate of user identification is 81.3% for three persons. and perfect entering/exiting behavior detection performance.