• Title/Summary/Keyword: stolen

Search Result 152, Processing Time 0.029 seconds

Real-time Vehicle Tracking Algorithm According to Eigenvector Centrality of Weighted Graph (가중치 그래프의 고유벡터 중심성에 따른 실시간 차량추적 알고리즘)

  • Kim, Seonhyeong;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.4
    • /
    • pp.517-524
    • /
    • 2020
  • Recently, many researches have been conducted to automatically recognize license plates of vehicles and use the analyzed information to manage stolen vehicles and track the vehicle. However, such a system must eventually be investigated by people through direct monitoring. Therefore, in this paper, the system of tracking a vehicle is implemented by sharing the information analyzed by the vehicle image among cameras registered in the IoT environment to minimize the human intervention. The distance between cameras is indicated by the node and the weight value of the weighted-graph, and the eigenvector centrality is used to select the camera to search. It demonstrates efficiency by comparing the time between analyzing data using weighted graph searching algorithm and analyzing all data stored in databse. Finally, the path of the vehicle is indicated on the map using parsed json data.

Structural Optimization of a Light-weight Manhole Cover Using FEM and Response Surface Method (유한요소법과 반응표면법을 이용한 경량 맨홀 커버 구조 최적화 설계)

  • Lee, Hyoungwook
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.25 no.6
    • /
    • pp.462-470
    • /
    • 2016
  • The locking load of a conventional manhole depends on the weight of its cover. Locking-type manhole structures with a special locking mechanism were recently developed to prevent accidents such as stolen cover, away cover from a frame. The weight of the manhole structure can be reduced under structural safety because the locking force of a locking-type manhole is greater than the weight of the cover. A light-weight manhole cover is developed in this study by using a finite element stress analysis and the design of experiments. Static stress analysis and fracture experiments are also conducted to analyze the states of the initial product. The optimum light-weight manhole cover considering manufacturing molds is developed and tested. Consequently, the weight was found to reduce by 16%. In addition, the fracture load increased by 38%.

Vulnerability Assessment on the Secured USB Keyboard (보안 USB 키보드의 데이터 탈취 가능성 진단)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.39-46
    • /
    • 2011
  • The user authentication on the security applications is one of the most important process. Because character based password is commonly used for user authentication, it is most important to protect the keyboard. Due to the reason, several software solutions for keyboard security have been applied to critical sites. This paper introduces vulnerabilities to the commonly used USB keyboard, implements a sample code using the vulnerabilities and evaluates the possibility for the keyboard data to be stolen in the guarded environment. Through the comparison of the result, a countermeasure to the vulnerabilities is proposed.

OECD 내분비계 장애물질 시험법 확립에 관한 연구

  • 한순영
    • Proceedings of the Korean Society of Developmental Biology Conference
    • /
    • 2001.02a
    • /
    • pp.12-13
    • /
    • 2001
  • 과학자들 사이에서만 논의되어 왔던 내분비계 장애물질 문제가 일반인들의 관심을 얻게 된 것은 T.Colborn, D.Dumanoski와 J.P.Myers가 과학논문을 근거로 집필한 '도둑맞은 미래(Our Stolen Future)'의 발간이 계기가 되었다 (1996년 1월). 그 후 컵라면 용기에서의 styrene dimers & trimers 검출 논란이 제기되면서 일본 및 우리나라에서도 관심을 갖게 되었는데, 이제 내분비계 장애물질 문제는 단순한 과학적 문제가 아니라 중요한 사회적, 환경적 문제로 인식되고 있으며 지구 온난화, 오존층 파괴와 더불어 지구 3대 환경 문제 중 하나로까지 거론되고 있다. 내분비계 장애물질 문제는 아직까지 명확히 규명되지 않은 상태로 인체에 미치는 영향을 밝히기까지는 장기간의 집중 연구가 필요하다. 여기서는 내분비계 장애작용 검색 및 시험법 확립을 위한 현 시점에서의 국제적 노력에 대하여 미국 EPA 및 OECD를 중심으로 알아보고 OECD 내분비계 장애물질 시험법 확립을 위한 국제협력연구의 일부 실험결과를 발표하고자 한다.

  • PDF

A Study of the Detecting Method about the Identification Card's Counterfeit, Modification and Illegal Use by Minors (미성년자의 신분증 위·변조 및 도용을 검출하기 위한 방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.87-101
    • /
    • 2018
  • Minors' law evasion is getting serious. Some of them make a fake ID card or use a stolen ID card illegally. They are illegally used for buying alcohol, cigarette, bond or going to club, pub, motel and so on. On the latest News, there was a case that teens rented a car with a driver licence without checking and had severe car accident. Like this case, car rental service was fined and suspended from business because they did not figure out ID card's counterfeit or modification. Thus, this study investigates the detecting method about the ID card(including a driver license) counterfeit, modification or illegal use. The server has a database of 17~19's minors one fingerprint and services whether the visitor is adult true or not. The method will be usable and economical for business. Then, it was compared and analyzed with methods already in use in business.

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

A Study on Recognition of Automobile Type and Plate Number Using Neural Network (신경회로망을 이용한 자동차 종류 및 차량번호 자동인식에 관한 연구)

  • Bae, Youn-Oh;Lee, Young-Jin;Chang, Yong-Hoon;Lee, Kwon-Soon
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.1107-1109
    • /
    • 1996
  • In this paper, we discuss the automatic recognition system of vehicle types and licence plate numbers using artificial neural networks, which will be used as vehicle identifier. We confine to expose the vehicle licence number for violating bus lane and stolen cars. Therefore, the vehicle height, width and distribution profile are used as the feature parameters of vehicle type. This system is composed of two parts: one is an image preprocessor of vehicle images and the other one is a pattern classifier by neural networks. The experimental results show that our method has good results for the recognition of vehicle types and numbers.

  • PDF

A Study on the Contents Security Management Model for Multi-platform Users

  • Joo, Hansol;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.10-14
    • /
    • 2021
  • Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.

A Scalable and Secure Medical Data Storage and Sharing System

  • sinai, Nday kabulo;Satyabrata, Aich;Kim, Hee-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.12-14
    • /
    • 2021
  • For the past couple of years, the medical data has been stored in centralized systems which is not the ideal storage technique since all data can be altered, stolen, or even used for evil purposes and, furthermore, the data cannot be safely shared with other doctors and hospitals in case of patient's transfer, change of state or country, in addition, patient's health status cannot be tracked and the patient's medical history is unknown. Therefore, powerful decentralized technologies and expertise can help provide better health information and help doctors and patients to better understand the situations before and after treatment, and do more research based on immutable and trusted data. One of the proposed solutions is storing and securing data on the blockchain which is less scalable, slow and expensive. Introducing a scalable, robust medical data storage and sharing system based on AI/ML, IoT, IPFS, and blockchain.

  • PDF

Isolation and Characterization of Eukaryotic Translation Initiation Factor 5A (eIF-5A) from Potato (감자로부터 Eukaryotic Translation Initiation Factor 5A (elF-5A) 유전자의 동정 및 발현 분석)

  • 인준교;신동호;최관삼;양덕춘
    • Korean Journal of Plant Tissue Culture
    • /
    • v.28 no.5
    • /
    • pp.283-287
    • /
    • 2001
  • Differential display based on PCR was employed to identify genes expressed during tuber-developing stage of potato (Solanum tuberosum L. cv. Irish Cobbler). An eukaryotic initiation factor 5A (eIF-5A) clone isolated from a cDNA library constructed with developing micro-tuber using a probe of PCR fragment. We isolated three positive clones and ore of them contained open reading frame. This clone revealed high sequence similarity to tomato eIF 5A cDNA. At the DNA level, there is 94.8% identity with the tomato eIF-5A4, whereas at the protein level there is a high identity with 97.5%. The potato eIF 5A clone is 716 bp in length and contains a single open reading frame from 57 to 539 bp, a 56 bp 5'-untranslated region and a 177 bp 3'-untranslated region. The deduced protein composed of 160 amino acid residues, with a predicted molecular mass of 17.4 kD and an estimated pl of 5.5. The sequence of 12 (STSKTGKHGHAK) amino acids among eIF-5A proteins is perfectly conserved from yeast to human. That sequence in potato eIF-5A protein is also conserved at position 46 to 57 amino acid. This region embeds the post-translational modification site of the lysine residue (at the seventh K) to hypusine that is crucial to eIF-5A activity. The northern blot analysis of eIF5A has shown abundant expression, mainly in flower organs (stamen, ovary, petal, sepal), fruit and stolen.

  • PDF