• Title/Summary/Keyword: 개인프레임

Search Result 349, Processing Time 0.028 seconds

Design of Image Recognition Module for Face and Iris Area based on Pixel with Eye Blinking (눈 깜박임 화소 값 기반의 안면과 홍채영역 영상인식용 모듈설계)

  • Kang, Mingoo
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • In this paper, an USB-OTG (Uiversal Serial Bus On-the-go) interface module was designed with the iris information for personal identification. The image recognition algorithm which was searching face and iris areas, was proposed with pixel differences from eye blinking after several facial images were captured and then detected without any activities like as pressing the button of smart phone. The region of pupil and iris could be fast involved with the proper iris area segmentation from the pixel value calculation of frame difference among the images which were detected with two adjacent open-eye and close-eye pictures. This proposed iris recognition could be fast processed with the proper grid size of the eye region, and designed with the frame difference between the adjacent images from the USB-OTG interface with this camera module with the restrict of searching area in face and iris location. As a result, the detection time of iris location can be reduced, and this module can be expected with eliminating the standby time of eye-open.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Abstraction Based Context Data Access Control Framework (추상화 기반 상황정보 접근 제어 프레임워크)

  • Kim, Yun-Sam;Cho, Eun-Sun;Cho, We-Duke
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.8-18
    • /
    • 2010
  • As Ubiquitous systems are developed, the number of context data which are dealt with systems also grow rapidly. In these data, some are vary important in privacy view. As these data are given to users or services of systems, probability of excess exposing of data is exist. To solve this problem, many systems use access control method like RBAC. But even this method can avoid unauthenticated access, can not prevent excess exposing of authenticated access. To prevent this exposing of context data, this paper suggests context data access control framework which abstracts context data when system gives these data to users or services. Using negotiation protocol and context data abstraction technique using RDF, our framework prevents excess exposing important data. This happens protecting privacy and keeping service continuity.

A Decentralized Frame Synchronization System for Ad-hoc Inter-Vehicle Communication Networks (Ad-hoc 차량통신 네트워크를 위한 자율분산 동기화 시스템)

  • Kim, Young-An;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.166-172
    • /
    • 2008
  • This paper proposes an autonomous decentralized frame synchronization system for Ad-hoc Inter-Vehicle Communication Network (IVCN). We have to consider the feature of Ad-hoc IVCN: "time variant" about the number and the location of vehicles and receive power in IVCN, frame timing, and fading. Proposed scheme is different from other decentralized synchronization systems that have association with a fixed base station, and from centralized Personal Communication Systems. This system includes an autonomous decentralized frame synchronization scheme for Ad-hoc IVCN, a high-speed algorithm, a protocol for a newly joining subscriber in IVCN, and a utilization of spread spectrum ranging for frame timing error of the system under highway conditions. Performance evaluation of proposed scheme is validated through simulation. It is shown that Ad-hoc IVCN can be carried out among one and surrounding vehicles in such environment.

Network Analysis and Frame Analysis on the Sensationalism of News Coverage according to the Influence of News Production Environment : based on the #metoo movement of celebrity (뉴스생산 환경에 따른 방송 보도의 선정성 네트워크 분석·프레임 분석 : 유명인에 대한 미투운동 사례를 중심으로)

  • Hong, Ju-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.103-119
    • /
    • 2018
  • This study explored news coverage on the sex crimes and analyzed news by network analysis and frame analysis based on the layered model to compare news coverage on the celebrity. As a result, in case of celebrity the broadcasting focused more and the tone of news is more sensational. The news in ground wave broadcasting more detailed on the sex crimes. It blamed the An, the governor of Chungnam more and the news is more sensational by interviewing marginal man. In #Metoo case, broadcasting news focused on the offender. The title of case name and the headline are framed based on the offender. Especially consensual relationship frame is dominated in the sex crime news. This study also can see the offender blaming frame and in the viewpoint of agenda-setting. It is difficult to find the cause of #Metoo movement and the structural approach on the case. This study highlighted the importance of layed model when analyzing the sex-crime news related with #Metoo movement.

Implementation of a Service Oriented Architecture based on JXTA - an SOA framework involving users - (개인사용자를 포함하는 JXTA 기반의 Service Oriented Architecture 구현)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Kim, Jun-Ryong;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.21-31
    • /
    • 2007
  • This Paper presents an SOA framework that enables smooth provision of service to ordinary users while also replacing the current B2B environment-oriented SOA framework. To that end, the proposed SOA will be reviewed for its concept, characteristics, and components. Key to its design is that it will be implemented using the prospective next-generation P2P platform known as JXTA. The proposed framework includes all the basic functions of other SOA frameworks, and will make Provision and use of services more easy compared with other frameworks. Under this service, data and applications controlling these data are provided in an enabling format, thereby addressing security problems. Another advantage of this proposed framework is that each peer is able to play all roles of a service provider, service client, and service registry.

  • PDF

Developing A Policy Framework for Smartwork : Task, Technology, People, Organization and Management (스마트워크 정책 프레임워크에 관한 연구)

  • Lee, Hyejung;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.145-164
    • /
    • 2012
  • With the development of Information Communication Technology (ICT), diverse work policies, such as, telework, telecommuting, flexible work had been conceptualized and implemented to encourage efficient business practices and worker satisfaction. These work policies are the forerunners of newly emerging concept of "Smart Work." However, as smart work is a new concept, no single agreeable definition can be found. In this study, the relevant literatures published in past 15 years are reviewed systematically in order to derive a conceptual framework for "Smart Work," from related research, such as telecommuting, flexible time, telework, etc. Related variables are grouped into five clusters: Task, Technology, People, Organization Structure and Managerial Levers, forming a policy and research framework. Further research are suggested after the discussion of implications.

Frame Analysis of Corona-19 News on Korean Public Broadcasting System: Focused on KBS (한국 공영방송의 '코로나19' 관련 보도의 프레임 분석: KBS <뉴스 9>를 중심으로)

  • Pyo, Siyoung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.112-122
    • /
    • 2020
  • This study analyzed how KBS's 'Type and Format', 'Professionalism' and 'Infectious Disease-related Issues' appear in the media news related to Corona-19 under the three periods of 'discovery', 'diffusion' and 'recovery'. According to an analysis of a total of 473 media news, In all three periods, 'Straight Report' and 'Information Delivery Frame' were high to inform the truth of the infectious disease. In addition, the 'transmission of facts' frame was more used than the emotional transmission in reporting the risk situation. However, the proportion of 'moral evaluation frames' in the second phase was relatively high, and the proportion of non-professional journalists was still overwhelmingly higher than professional journalists. Meanwhile, infectious disease-related issues had the most content on 'infection control', and relatively little information on how to deal with them. Based on the above findings, this study suggested the implications of 'Increased in-depth and professional press coverage', 'Refrain from moral evaluation frames' and 'a comprehensive presentation of various infectious disease-related information'.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

Smart Home Personalization Service based on Context Information using Speech (음성인식을 이용한 상황정보 기반의 스마트 흠 개인화 서비스)

  • Kim, Jong-Hun;Song, Chang-Woo;Kim, Ju-Hyun;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.80-89
    • /
    • 2009
  • The importance of personalized services has been attracted in smart home environments according to the development of ubiquitous computering. In this paper, we proposed the smart home personalized service system based on context information using the speech recognition. The proposed service consists of an OSGi framework based service mobile manager, service manager, voice recognition manager, and location manager. Also, this study defines the smart home space and configures the commands of units, sensor information, and user information that are largely used in the defined space as context information. In particular, this service identifies users who exist in the same space that shows a difficulty in the identification using RFID through the training model and pattern matching in voice recognition and supports the personalized service of smart home applications. In the results of the experiment, it was verified that the OSGi based automated and personalized service can be achieved through verifying users in the same space.