• Title/Summary/Keyword: personal computer

Search Result 2,599, Processing Time 0.026 seconds

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

Implementation of Responsive Web-based Vessel Auxiliary Equipment and Pipe Condition Diagnosis Monitoring System (반응형 웹 기반 선박 보조기기 및 배관 상태 진단 모니터링 시스템 구현)

  • Sun-Ho, Park;Woo-Geun, Choi;Kyung-Yeol, Choi;Sang-Hyuk, Kwon
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.562-569
    • /
    • 2022
  • The alarm monitoring technology applied to existing operating ships manages data items such as temperature and pressure with AMS (Alarm Monitoring System) and provides an alarm to the crew should these sensing data exceed the normal level range. In addition, the maintenance of existing ships follows the Planned Maintenance System (PMS). whereby the sensing data measured from the equipment is monitored and if it surpasses the set range, maintenance is performed through an alarm, or the corresponding part is replaced in advance after being used for a certain period of time regardless of whether the target device has a malfunction or not. To secure the reliability and operational safety of ship engine operation, it is necessary to enable advanced diagnosis and prediction based on real-time condition monitoring data. To do so, comprehensive measurement of actual ship data, creation of a database, and implementation of a condition diagnosis monitoring system for condition-based predictive maintenance of auxiliary equipment and piping must take place. Furthermore, the system should enable management of auxiliary equipment and piping status information based on a responsive web, and be optimized for screen and resolution so that it can be accessed and used by various mobile devices such as smartphones as well as for viewing on a PC on board. This update cost is low, and the management method is easy. In this paper, we propose CBM (Condition Based Management) technology, for autonomous ships. This core technology is used to identify abnormal phenomena through state diagnosis and monitoring of pumps and purifiers among ship auxiliary equipment, and seawater and steam pipes among pipes. It is intended to provide performance diagnosis and failure prediction of ship auxiliary equipment and piping for convergence analysis, and to support preventive maintenance decision-making.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

Digital technique in diagnosis and restoration of maxillary anterior implant: a case report (디지털 기법을 활용한 상악 전치부의 진단 및 수복 증례)

  • Haemin, Bang;Woohyung, Jang;Chan, Park;Kwi-Dug, Yun;Hyun-Pil, Lim;Sangwon, Park
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.38 no.4
    • /
    • pp.249-256
    • /
    • 2022
  • The implant prosthesis of anterior maxilla requires careful consideration in planning. In order to satisfy both esthetic and functional needs of a patient, fusion of intra-oral scan in Cone-beam computed tomography (CBCT) and facial scan can be considered. Bony structures and soft tissues captured in CBCT and occlusal surfaces of intra oral scan were incorporated into personal characteristics from facial scan. The patient had insufficient buccal bone on maxillary anterior area. The maxillary implants could not be placed on the most ideal position. However, the "top down" approach completed by computer-generated arranging of teeth in implant planning and surgery with surgical guide resulted in esthetically and functionally satisfying result regardless of the limitation. Careful diagnosis with digital technique and the usage of surgical guide resulted in successful surgery and esthetic restoration. The temporary fixed prostheses were designed, restored and evaluated. The patient was not satisfied with the first design of temporary prosthesis, which showed uneven space distribution between teeth due to the position of maxillary implant. The design was modified by changing proximal emergence contours and line angle to alter the perceived since of incisors. The patient was satisfied with the new design of provisional restoration. A digital occlusion analyzer (Arcus Digma II, KaVo, Leutkirch, Germany) was used to measure inherent condylar guidance and anterior guidance of a patient to provide a definitive prosthesis.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

An Implementation of Lighting Control System using Interpretation of Context Conflict based on Priority (우선순위 기반의 상황충돌 해석 조명제어시스템 구현)

  • Seo, Won-Il;Kwon, Sook-Youn;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.23-33
    • /
    • 2016
  • The current smart lighting is shaped to offer the lighting environment suitable for current context, after identifying user's action and location through a sensor. The sensor-based context awareness technology just considers a single user, and the studies to interpret many users' various context occurrences and conflicts lack. In existing studies, a fuzzy theory and algorithm including ReBa have been used as the methodology to solve context conflict. The fuzzy theory and algorithm including ReBa just avoid an opportunity of context conflict that may occur by providing services by each area, after the spaces where users are located are classified into many areas. Therefore, they actually cannot be regarded as customized service type that can offer personal preference-based context conflict. This paper proposes a priority-based LED lighting control system interpreting multiple context conflicts, which decides services, based on the granted priority according to context type, when service conflict is faced with, due to simultaneous occurrence of various contexts to many users. This study classifies the residential environment into such five areas as living room, 'bed room, study room, kitchen and bath room, and the contexts that may occur within each area are defined as 20 contexts such as exercising, doing makeup, reading, dining and entering, targeting several users. The proposed system defines various contexts of users using an ontology-based model and gives service of user oriented lighting environment through rule based on standard and context reasoning engine. To solve the issue of various context conflicts among users in the same space and at the same time point, the context in which user concentration is required is set in the highest priority. Also, visual comfort is offered as the best alternative priority in the case of the same priority. In this manner, they are utilized as the criteria for service selection upon conflict occurrence.

Biomechanical Comparative Analysis of Two Goal-kick Motion in Soccer (두 가지 축구 골킥 동작의 운동역학적 비교 분석)

  • Jin, Young-Wan;Shin, Je-Min
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.29-44
    • /
    • 2005
  • The purpose of this study is to reveal the effects of two different kicks, the drop kick and the punt kick, into the kicking motion, through the kinetic comparative analysis of the kicking motion, which is conducted when one kicks a soccer goal. To grasp kinetic changing factors, which is performed by individual's each body segment, I connected kicking motions, which were analyzed by a two dimension co-ordination, into the personal computer to concrete the digits of it and smoothed by 10Hz. Using the smoothed data, I found a needed kinematical data by inputting an analytical program into the computer. The result of comparative analysis of two kicking motions can be summarized as below. 1. There was not a big difference between the time of the loading phase and the time of the swing phase, which can affect the exact impact and the angle of balls aviation direction. 2. The two kicks were not affected the timing and the velocity of the kicking leg's segment. 3. In the goal kick motion, the maximum velocity timing of the kicking leg's lower segment showed the following orders: the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.018sec) in the drop kick, and the thigh(-0.06sec), the lower leg(-0.05sec), the foot(-0.015sec) in the punt kick. It showed that whipping motion increases the velocity of the foot at the time of impact. 4. At the time of impact, there was not a significant difference in the supporting leg's knee and ankle. When one does the punt kick, the subject spreads out his hip joint more at the time of impact. 5. When the impact performed, kicking leg's every segment was similar. Because the height of the ball is higher in the punt kick than in the drop kick, the subject has to stretch the knees more when he kicks a ball, so there is a significant affect on the angle and the distance of the ball's flying. 6. When one performs the drop kick, the stride is 0.02m shorter than the punt kick, and the ratio of height of the drop kick is 0.05 smaller than the punt kick. This difference greatly affects the center of the ball, the supporting leg's location, and the location of the center of gravity with the center of the ball at the time of impact. 7. Right before the moment of the impact, the center of gravity was located from the center of the ball, the height of the drop kick was 0.67m ratio of height was 0.37, and the height of the punt kick was 0.65m ratio of height was 0.36. The drop kick was located more to the back 0.21m ratio of height was 0.12, the punt kick was located more to the back 0.28m ratio of height was 0.16. 8. There was not a significant difference in the absolute angle of incidence and the maximum distance, but the absolute velocity of incidence showed a significant difference. This difference is caused from that whether players have the time to perform of not; the drop kick is used when the players have time to perform, and punt kick is used when the players launch a shifting attack. 9. The surface reaction force of the supporting leg had some relation with the approaching angle. Vertical reaction force (Fz) showed some differences in the two movements(p<0.05). The maximum force of the right and left surface reaction force (Fx) didn't have much differences (p<0.05), but it showed the tendency that the maximum force occurs before the peak force of the front and back surface (Fy) occurs.

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest (관심영역 암호화 시 발생하는 H.264 영상의 비트레이트 오버헤드 최소화 방법 연구)

  • Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.311-326
    • /
    • 2018
  • This paper has experimented using News sample video with QCIF ($176{\times}144$) resolution in JM v10.2 code of H.264/AVC-MPEG. The region of interest (ROI) to be encrypted occurred the drift by unnecessarily referring to each frame continuously in accordance with the characteristics of the motion prediction and compensation of the H.264 standard. In order to mitigate the drift, the latest related research method of re-inserting encrypted I-picture into a certain period leads to an increase in the amount of additional computation that becomes the factor increasing the bit-rate overhead of the entire video. Therefore, the reference search range of the block and the frame in the ROI to be encrypted is restricted in the motion prediction and compensation for each frame, and the reference search range in the non-ROI not to be encrypted is not restricted to maintain the normal encoding efficiency. In this way, after encoding the video with restricted reference search range, this article proposes a method of RC4 bit-stream encryption for the ROI such as the face to be able to identify in order to protect personal information in the video. Also, it is compared and analyzed the experimental results after implementing the unencrypted original video, the latest related research method, and the proposed method in the condition of the same environment. In contrast to the latest related research method, the bit-rate overhead of the proposed method is 2.35% higher than that of the original video and 14.93% lower than that of the latest related method, while mitigating temporal drift through the proposed method. These improved results have verified by experiments of this study.