• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.036 seconds

Real-time Abnormal Behavior Analysis System Based on Pedestrian Detection and Tracking (보행자의 검출 및 추적을 기반으로 한 실시간 이상행위 분석 시스템)

  • Kim, Dohun;Park, Sanghyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.25-27
    • /
    • 2021
  • With the recent development of deep learning technology, computer vision-based AI technologies have been studied to analyze the abnormal behavior of objects in image information acquired through CCTV cameras. There are many cases where surveillance cameras are installed in dangerous areas or security areas for crime prevention and surveillance. For this reason, companies are conducting studies to determine major situations such as intrusion, roaming, falls, and assault in the surveillance camera environment. In this paper, we propose a real-time abnormal behavior analysis algorithm using object detection and tracking method.

  • PDF

Cascaded-Hop For DeepFake Videos Detection

  • Zhang, Dengyong;Wu, Pengjie;Li, Feng;Zhu, Wenjie;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1671-1686
    • /
    • 2022
  • Face manipulation tools represented by Deepfake have threatened the security of people's biological identity information. Particularly, manipulation tools with deep learning technology have brought great challenges to Deepfake detection. There are many solutions for Deepfake detection based on traditional machine learning and advanced deep learning. However, those solutions of detectors almost have problems of poor performance when evaluated on different quality datasets. In this paper, for the sake of making high-quality Deepfake datasets, we provide a preprocessing method based on the image pixel matrix feature to eliminate similar images and the residual channel attention network (RCAN) to resize the scale of images. Significantly, we also describe a Deepfake detector named Cascaded-Hop which is based on the PixelHop++ system and the successive subspace learning (SSL) model. By feeding the preprocessed datasets, Cascaded-Hop achieves a good classification result on different manipulation types and multiple quality datasets. According to the experiment on FaceForensics++ and Celeb-DF, the AUC (area under curve) results of our proposed methods are comparable to the state-of-the-art models.

Digital Information Service for Lone Elderly (독거노인을 위한 디지털 알리미 서비스)

  • Han, Jeong-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.520-522
    • /
    • 2022
  • Lone Death is increasing as elderly population increases. Lone elderly is vulnerable in society for many reasons. This paper explores digital solution to protect solitary in society. First, sensor and AI care robot can be used to collect digital data and situation check. Second, digital device is checked regularly and visiting is expanded in digital environment. Third, digital emergency security system should be established. Fourth, user education is to be regularly carried out including complementary education.

  • PDF

Optimal Hierarchical Design Methodology for AESA Radar Operating Modes of a Fighter (전투기 AESA 레이더 운용모드의 최적 계층구조 설계 방법론)

  • Heungseob Kim;Sungho Kim;Wooseok Jang;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.281-293
    • /
    • 2023
  • This study addresses the optimal design methodology for switching between active electronically scanned array (AESA) radar operating modes to easily select the necessary information to reduce pilots' cognitive load and physical workload in situations where diverse and complex information is continuously provided. This study presents a procedure for defining a hidden Markov chain model (HMM) for modeling operating mode changes based on time series data on the operating modes of the AESA radar used by pilots while performing mission scenarios with inherent uncertainty. Furthermore, based on a transition probability matrix (TPM) of the HMM, this study presents a mathematical programming model for proposing the optimal structural design of AESA radar operating modes considering the manipulation method of a hands on throttle-and-stick (HOTAS). Fighter pilots select and activate the menu key for an AESA radar operation mode by manipulating the HOTAS's rotary and toggle controllers. Therefore, this study presents an optimization problem to propose the optimal structural design of the menu keys so that the pilot can easily change the menu keys to suit the operational environment.

A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment

  • Hong Wang
    • Journal of Information Processing Systems
    • /
    • v.19 no.5
    • /
    • pp.688-701
    • /
    • 2023
  • The conventional methods of network intrusion detection system (NIDS) cannot measure the trend of intrusiondetection targets effectively, which lead to low detection accuracy. In this study, a NIDS method which based on a deep neural network in a big-data environment is proposed. Firstly, the entire framework of the NIDS model is constructed in two stages. Feature reduction and anomaly probability output are used at the core of the two stages. Subsequently, a convolutional neural network, which encompasses a down sampling layer and a characteristic extractor consist of a convolution layer, the correlation of inputs is realized by introducing bidirectional long short-term memory. Finally, after the convolution layer, a pooling layer is added to sample the required features according to different sampling rules, which promotes the overall performance of the NIDS model. The proposed NIDS method and three other methods are compared, and it is broken down under the conditions of the two databases through simulation experiments. The results demonstrate that the proposed model is superior to the other three methods of NIDS in two databases, in terms of precision, accuracy, F1- score, and recall, which are 91.64%, 93.35%, 92.25%, and 91.87%, respectively. The proposed algorithm is significant for improving the accuracy of NIDS.

Streamlining ERP Deployment in Nepal's Oil and Gas Industry: A Case Analysis

  • Dipa Adhikari;Bhanu Shrestha;Surendra Shrestha;Rajan Nepal
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.140-147
    • /
    • 2024
  • Oil and gas industry is a unique sector with complex activities, long supply chains and strict rules for the business. It is important to use enterprise resource planning (ERP) systems to address these challenges as it helps in simplifying operations, improving efficiency and facilitating evidence-based decision making. Nonetheless, successful integration of ERP systems in this industry involves careful planning, customization and alignment with specific business processes including regulatory requirements. Several critical factors, such as strong change management, support of top managers and training that works have been identified in the study. Amongst the hurdles are employee resistance towards the changes, data migration complications and integration with existing systems. Nonetheless, NOCL's ERP implementation resulted in significant improvements in operating efficiency, better data visibility and compliance management. It also led to a decrease in financial reporting timeframes, more accurate inventory tracking and improved decision-making capabilities. The study provides useful insights on how to optimize oil and gas sector ERP implementations; key among them is practical advice including strengthening change management strategies, prioritizing data security and collaborating with ERP vendors. The research highlights the importance of tailoring ERP solutions to specific industry needs as well as emphasizes the strategic role of ongoing monitoring/feedback for future benefits sustainability.

Discourse of Modernization of Korean Housing: The Transition of Housing Facilities and the Technicalization of Housing Life - Content Analysis of Advertising Materials - (부거설비의 진보와 주거생활의 기술화 측면에서 본 한국 주거의 근대화 논의 - 70년대부터 90년대까지의 아파트 광고를 중심으로 -)

  • Jun, Nam-Il;Eun, Nan-Soon;Park, Jin-Hee;Lee, Jang-Seob;Kim, So-Yeon
    • Journal of the Korean housing association
    • /
    • v.18 no.3
    • /
    • pp.115-123
    • /
    • 2007
  • The purpose of this study was to examine how housing facilities have been progressed, how housing life has been technicalized and which factors contributed to the modernization of Korean housing in the economic development era. Review of advertising material for apartment sales in the newspaper from 1970s' to the 1990s' are mainly utilized to follow up the changes of kitchen equipment and furnitures, bathroom equipments, heating and cooking facilities and their fuel system, information and telecommunication system as well as security and intelligent system. However, high technology in apartment was a symbol of modem housing in each time. The improvement of housing facilities brought about the improvement of efficiency in household works. In other words, housing space plays as "Living Machine". And appearance of new technology systems leaded to a pluralistic activities in the home. As well as improvement on the material environments accelerated the individualization phenomena in housing space.

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

XMPP-based Vehicle messaging System for Collaboration and Contents Sharing (협업 및 콘텐츠 공유를 위한 XMPP기반 차량용 메시징 시스템)

  • Jung, Hun;Park, HaeWoo;KU, Jahyo
    • Journal of the Korea society of information convergence
    • /
    • v.5 no.2
    • /
    • pp.67-76
    • /
    • 2012
  • XML-based open protocol, XMPP users to pass messages to other users, which means that a decentralized communication network is the network infrastructure and enable it. In addition, XMPP servers using a professional server-to-server protocol to communicate with each other and decentralized social networks and collaboration framework provides an important possibility. In this paper, the features of XMPP messaging protocol is applicable to automotive telematics terminals XMPP-based platform design, and presence of two-way communication point for the problem, point-to-point session setup issues, security issues, compatibility issues, and to solve the scalability problem XMPP-based messaging system was implemented.

  • PDF

Fuzzy Threshold Inference of a Nonlinear Filter for Color Sketch Feature Extraction (컬러 스케치특징 추출을 위한 비선형 필터의 퍼지임계치 추론)

  • Cho Sung-Mok;Cho Ok-Lae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.3
    • /
    • pp.398-403
    • /
    • 2006
  • In this paper, we describe a fuzzy threshold selection technique for feature extraction in digital color images. this is achieved by the formulation a fuzzy inference system that evaluates threshold for feature configurations. The system uses two fuzzy measures. They capture desirable characteristics of features such as dependency of local intensity and continuity in an image. We give a graphical description of a nonlinear sketch feature extraction filter and design the fuzzy inference system in terms of the characteristics of the feature. Through the design, we provide selection method on the choice of a threshold to achieve certain characteristics of the extracted features. Experimental results show the usefulness of our fuzzy threshold inference approach which is able to extract features without human intervention.

  • PDF