• Title/Summary/Keyword: 개인추적

Search Result 387, Processing Time 0.023 seconds

Implementation of Personalized Mobile Agent System using Agilla in Ubiquitous Sensor Network (USN환경에서 Agilla를 이용한 개인화된 모바일 에이전트 시스템 구현)

  • Kim, Gang-Seok;Lee, Dong-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.203-210
    • /
    • 2011
  • The current sensor network analyzes the data collected by the sensing of fixed sensor nodes and provides a service. However, this method cannot actively handle the state and the change in the position of people, 'the target for sensing and the change in the environment', including home automation, building automation and real-time road & weather information, and healthcare environment, etc. To support a dynamic situation which is appropriate for an individual in this diverse environment, it is necessary to provide actively differentiated specific information according to the movement of people and the changes in the environment. In this study, a individualized sensor mobile agent middleware which provides the individualized information (the location of fire incidence and the trace for the path of spread), has been realized through the sensor network environment constructed by the installation of wireless sensor nodes mounted with mobile agent middlewares in buildings.

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

Development of Internet Vulnerability Index for Youth through Internet Overdependency Analysis (인터넷 과의존 요인분석을 통한 청소년의 인터넷 취약성 지수 개발)

  • Jung, Nam-Su;Choi, Myeong-Ok;Lee, Young-Sun;Ahn, Hu-Nam
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.345-358
    • /
    • 2019
  • The purpose of this study is to develop the Internet vulnerability index of adolescents. To do this, we used the original data of long - term follow - up survey for the internet overdependency cause analysis conducted by NIA in 2018, and analyzed the correlation between alternatives of internet vulnerability index and personal psychology by using linear regression analysis. Factor analysis showed that the relationship with the surroundings was indexed by adding 9 items to positive factors such as family acceptance, peer attachment, and teacher favorability. The relationship between the surroundings and self - stigmatization is confirmed, and the relationship between the surroundings and the Internet fragility is predicted to be negatively related, and the digital capacity is also assumed to be negatively correlated with the Internet vulnerability. In order to develop the specific form of the Internet vulnerability index, personal psychology and linear regression analysis were conducted. As a result, positive factors and R value of personal psychology were increased when considering the relationship with the environment and the digital capacity rather than the Internet overdependency model. Based on these implications, we discussed the implications and limitations of this study.

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

MyData Cloud: Secure Cloud Architecture for Strengthened Control Over Personal Data (MyData Cloud: 개인 정보 통제 강화를 위한 안전한 클라우드 아키텍쳐 설계)

  • Seungmin Heo;Yonghee Kwon;Beomjoong Kim;Kiseok Jeon;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.597-613
    • /
    • 2024
  • MyData is an approach of personal data management, which grants data subjects the right to decide how to use and where to provide their data. With the explicit consent of the subjects, service providers can collect scattered data from data sources and offer personalized services based on the collected data. In existing service models, personal data saved in data storage can be shared with data processors of service providers or third parties. However, once personal data are transferred to third-party processors, it is difficult for data subjects to trace and control their personal data. Therefore, in this paper, we propose a cloud model where both data storage and processor are located within a single cloud, ensuring that data do not leave the cloud.

Development of Motion Recognition Platform Using Smart-Phone Tracking and Color Communication (스마트 폰 추적 및 색상 통신을 이용한 동작인식 플랫폼 개발)

  • Oh, Byung-Hun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.143-150
    • /
    • 2017
  • In this paper, we propose a novel motion recognition platform using smart-phone tracking and color communication. The interface requires only a camera and a personal smart-phone to provide a motion control interface rather than expensive equipment. The platform recognizes the user's gestures by the tracking 3D distance and the rotation angle of the smart-phone, which acts essentially as a motion controller in the user's hand. Also, a color coded communication method using RGB color combinations is included within the interface. Users can conveniently send or receive any text data through this function, and the data can be transferred continuously even while the user is performing gestures. We present the result that implementation of viable contents based on the proposed motion recognition platform.

On the Design of Demodulator and Equalizer of 9600 BPS Modem (9600 BPS Modem의 복조기와 Equalizer에 관한 연구)

  • 장춘서;은종관
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.20 no.4
    • /
    • pp.10-15
    • /
    • 1983
  • In this paper effective methods of demodulation and equalization in a 9600 bps modem have been studied. To reduce the number of multiplications required per symbol in demodula-tion, the method of using a decimation filter is presented. In the equalizer the optimum step size and the steady state mean-squared error (MSE) are obtained from computer simulation results. The performance of the first-order carrier phase tracking loop is compared with that of the second-order loop when carrier frequency offset exists. In addition, the finite word length effects in the equalizer are studied.

  • PDF

ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식

  • ;Lee, Jae-Eon;Kim, Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.526-535
    • /
    • 2005
  • 우리나라의 주민등록증은 주소지, 주민등록 변호, 얼굴사진, 지문 등 개개인의 방대한 정보를 가진다. 현재의 플라스틱 주민등록증은 위조 및 변조가 쉽고 날로 전문화 되어가고 있다. 따라서 육안으로 위조 및 변조 사실을 쉽게 확인하기가 어려워 사회적으로 많은 문제를 일으키고 있다. 이에 본 논문에서는 주민등록증 영상을 자동 인식할 수 있는 개선된 ART2 기반 RBF 네트워크와 얼굴인증을 이용한 주민등록증 자동 인식 방법을 제안한다. 제안된 방법은 주민등록증 영상에서 주민등록번호와 발행일을 추출하기 위하여 영상을 소벨마스크와 미디언 필터링을 적용한 후에 수평 스미어링을 적용하여 주민등록번호와 발행일 영역을 검출한다. 그리고 4 방향 윤곽선 추적 알고리즘으로 개별 문자를 추출하기 위한 전 단계로 주민등록증 영상에 대해 고주파 필터링을 적용하여 주민등록증 영상 전체를 이진화 한다. 이진화된 주민등록영상에서 COM 마스크를 적용하여 주민등록번호와 발행일 코드를 복원하고 검출된 각 영역에 대해 4 방향 윤곽선 추적 알고리즘으로 개별 문자를 추출한다. 추출된 개별 문자는 개선된 ART2 기반 RBF 네트워크를 제안하여 인식에 적용한다. 제안된 ART2 기반 RBF 네트워크는 학습 성능을 개선하기 위하여 중간충과 출력층의 학습에 퍼지 제어 기법을 적용하여 학습률을 동적으로 조정한다. 얼굴인증은 템플릿 매칭 알고리즘을 이용하여 얼굴 템플릿 데이터베이스를 구축하고 주민등록증애서 추출된 얼굴영역과의 유사도를 측정하여 주민등록증 얼굴 영역의 위조여부를 판별한다.

  • PDF

A Method for Detecting Event-location using Relevant Words Clustering in Tweet (트위터에서의 연관어 군집화를 이용한 이벤트 지역 탐지 기법)

  • Ha, Hyunsoo;Woo, Seungmin;Yim, Junyeob;Hwang, Byung-Yeon
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.680-682
    • /
    • 2015
  • 최근 스마트폰의 보급으로 소셜 네트워크 서비스를 이용하는 사용자들이 급증하였다. 그 중 트위터는 정보의 빠른 전파력과 확산성으로 인해 현실에서 발생한 이벤트를 탐지하는 도구로 활용하는 것이 가능하다. 따라서 트위터 사용자 개개인을 하나의 센서로 가정하고 그들이 작성한 트윗 텍스트를 분석한다면 이벤트 탐지의 도구로써 활용할 수 있다. 이와 관련된 연구들은 이벤트 발생 위치를 추적하기 위해 GPS좌표를 이용하지만 트위터 사용자들이 위치정보 공개에 회의적인 점을 감안하면 명확한 한계점으로 제시될 수 있다. 이에 본 논문에서는 트위터에서 제공하는 위치정보를 이용하지 않고, 트윗 텍스트에서 위치정보를 추적하는 방법을 제시하였다. 트윗 텍스트에서 키워드간의 관계를 고려하여 이벤트의 사실여부를 결정하였으며, 실험을 통해 기존 매체들보다 빠른 탐지를 보임으로써 제안된 시스템의 필요성을 보였다.

Prototype of Block Tracing System for Pre-Erection Area using PDA and GPS (PDA 및 GPS를 이용한 옥외 작업장 블록 위치 추적 시스템 개발)

  • Shin, Jong-Gye;Lee, Jang-Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.43 no.1 s.145
    • /
    • pp.87-95
    • /
    • 2006
  • There are hundreds of ship blocks which are under the block assembly, painting, and outfitting assembly works in the pre-erection shops of shipyard. Generally, each block is planned to be processed in a pre-erection shop according to the block type by the long-term production-scheduling before six months. However, many blocks can't be processed in the planned time and the planned shop since the before and after block-processing changes or delays the planned sequential works in pre-erection shops. Therefore, it is essential to monitor the current location of each block and work in process to cope with the changed situation of pre-erection shops. Present study integrates PDA, GPS, and CDMA not only to chase the location of each block but also to exchange the pre-erection work order and the work report between the production-scheduling server and the production managers in the pre-erection shops. This study shows a prototype for the block tracing and process monitoring in the pre-erection shops.