• 제목/요약/키워드: 개인 식별 시스템

Search Result 445, Processing Time 0.035 seconds

Biometrics Based on Multi-View Features of Teeth Using Principal Component Analysis (주성분분석을 이용한 치아의 다면 특징 기반 생체식별)

  • Chang, Chan-Wuk;Kim, Myung-Su;Shin, Young-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2007
  • We present a new biometric identification system based on multi-view features of teeth using principal components analysis(PCA). The multi-view features of teeth consist of the frontal view, the left side view and the right side view. In this paper, we try to stan the foundations of a dental biometrics for secure access in real life environment. We took the pictures of the three views teeth in the experimental environment designed specially and 42 principal components as the features for individual identification were developed. The classification for individual identification based on the nearest neighbor(NN) algorithm is created with the distance between the multi-view teeth and the multi-view teeth rotated. The identification performance after rotating two degree of test data is 95.2% on the left side view teeth and 91.3% on the right side view teeth as the average values.

  • PDF

The Development of Information Circulation System for Science & Technology Video Digital Contents Based on KOI(Knowledge Object Identifier) (식별체계기반 과학기술 동영상 콘텐츠 유통시스템 구축 방안)

  • Seok Jung-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.65-71
    • /
    • 2005
  • With the rapid improvement of the internet and information technology, digital contents containing knowledge and information resource is circulated through the internet. A circulation system based on a standardized identifier is required to share this kind of information, generated from seminars and workshops conducted in the area of science and technology and saved in the form of digital video contents. The main objective of this study is on constructing an information circulation system based on the KOI identifier to effectively share the digital video contents produced from seminars and workshops related to the area of science and technology. Furthermore, the overview and status of a standardized identifier, and the functional aspects of the system such as the methods to apply the KOI identification system on the subject and its slides of digital video contents, a digital video contents management system, a centralized identifier management system, and the methods applied for the search of digital video metadata have been suggested to support construction of the information circulation system.

  • PDF

Analysis of Massive MIMO Wireless Channel Characteristics (Massive MIMO 시스템의 무선 채널 특성 분석)

  • Jang, Jeong-Uk;Kim, Jin-Hyuk;Mun, Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.216-221
    • /
    • 2013
  • In this paper, wireless channel characteristics of massive MIMO system is analyzed by comparing angular spread, cross polarization discrimination(XPD) and delay spread of dual polarized 4 and 128 transmit array antenna systems, by using 3D rat-tracing simulator, Wireless Insite in microcell environments. The analysis shows that increasing the number of transmit antennas results in the smaller angular spread and delay spread, and the higher value of XPD.

정보의 기밀등급 분류 방법의 개요

  • 김세헌
    • Review of KIISC
    • /
    • v.1 no.1
    • /
    • pp.124-129
    • /
    • 1991
  • 정보 보안의 요소는 인가되지 않은 사람이 시스템에 액세스(Access)하거나 인가없 이 사용하는 것을 방지하는 액세스 통제이다. 이를 위해서 정보의 기밀정도에 따라 보호정 도를 결정하는 기밀등급분류가 이루어져 정보를 선택관리하는체계가 이루어 져야한다. 정 보를 선택관리하기 위해서는 보호할 만한 정보를 식별하고, 식별된 중요정보를 어떤 방법 으로 유지, 관리, 이용할 것인지를 규정하는 것이 필요하다. 본 논문에서는 정보 기밀등급 의 체계적인 분류방법에 대해 살펴보기로 한다.

  • PDF

System Identification of a Three-story Test Structure based on Finite Element Model (유한요소모델에 기초한 3층 건물모델의 시스템 식별)

  • 이상현;민경원;강경수
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.14 no.5
    • /
    • pp.416-423
    • /
    • 2004
  • In this paper, an experimental verification of system identification technique for constructing finite element model is conducted for a three-story test structure equipped with an active mass driver (AMD). Twenty Gaussian white noises were used as the input for AMD, and the corresponding accelerations of each floor are measured. Then, the complex frequency response function (FRF) for the input, the force induced by the AMD, was obtained and subsequently, the Markov parameters and system matrices were estimated. The magnitudes as well as phase of experimentally obtained FRFs match well with those of analytically obtained FRFs.

A Study on Threat Identification Using Attack Tree for Personal Information in Smart Grid (스마트그리드 환경에서 Attack Tree를 이용한 개인정보 위협 식별에 관한 연구)

  • Baek, Man-Ki;Cho, Chae-Ho;Won, Yoo-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.339-342
    • /
    • 2016
  • 스마트그리드는 기존 전력망의 비효율적인 운영, 이산화탄소 과다 배출, 전력피크의 문제를 해결하기 위한 방법으로 주목받고 있다. 하지만, 기존의 ICT가 도입되고 구조가 복잡해짐에 따라 개인정보를 침해 할 수 있는 가능성이 증가하게 되었다. 본 논문에서는 스마트그리드 내에서 개인정보를 다루는 기기, 시스템, 데이터와 같은 자산을 식별하여 공격자 입장에서의 공격 목표를 설정한 뒤, Attack Tree 방법을 통하여 세부적인 위협을 식별하였다. 분석 결과, 스마트그리드 환경은 기존의 ICT 기술이 접목되기 때문에 스마트그리드 구조상 발생할 수 있는 위협뿐 만 아니라 기존의 기술들에서 발생할 수 있는 위협도 함께 존재했다.

Personal Identification Using One Dimension Iris Signals (일차원 홍채 신호를 이용한 개인 식별)

  • Park, Yeong-Gyu;No, Seung-In;Yun, Hun-Ju;Kim, Jae-Hui
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.1
    • /
    • pp.70-76
    • /
    • 2002
  • In this paper, we proposed a personal identification algorithm using the iris region which has discriminant features. First, we acquired the eye image with the black and white CCD camera and extracted the iris region by using a circular edge detector which minimizes the search space for real center and radius of the iris. And then, we localized the iris region into several circles and extracted the features by filtering signals on the perimeters of circles with one dimensional Gabor filter We identified a person by comparing ,correlation values of input signals with the registered signals. We also decided threshold value minimizing average error rate for FRR(Type I)error rate and FAR(Type II)error rate. Experimental results show that proposed algorithm has average error rate less than 5.2%.

User Identification and Entrance/Exit Detection System Using Ultrasonic Sensors (초음파 센서를 사용한 사용자 식별 및 출입 감지 시스템)

  • Lee, Seon-Woo;Kim, Jong-Wan
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.660-665
    • /
    • 2006
  • 본 논문에서는 유비쿼터스 컴퓨팅 구현에 있어서 중요 핵심 요소 기술인 실내에서의 사용자의 위치를 인식하면서 동시에 사용자를 식별하는 방법에 대해 제안하고자 한다. 제안된 사용자 식별 방법은 초음파 센서의 물체까지의 거리를 측정할 수 있는 특성에 기초하여 구성원의 키 높이의 다름을 주요한 식별 특성으로 이용하는 방법이다. 또한 사용자 식별을 수행하는 것과 동시에 식별된 사용자가 센서가 장착된 문을 통과하여 들어왔는지 나갔는지를 감지하는 출입 감지 방법도 제안한다. 기본적인 출입 감지 방법의 아이디어는 2개 초음파 센서의 물체 감지 순서를 이용하여 개발되었다. 제안된 방법의 성능 검증을 위해 1단계의 프로토타입을 만들었으며, 개발된 프로토타입을 이용하여 3명의 가족 구성원으로 이루어진 일반 가정집의 화장실에 장착하여 성능 실험을 실시하였다. 실험 결과 100%의 사용자 식별 성능 및 평균 98%의 출입 감지 성능을 얻었다.

  • PDF

A Revised QT Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜)

  • Lim, In-Taek;Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.430-436
    • /
    • 2006
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.

A revised Query Tree Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 쿼리 트리 프로토콜)

  • Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.491-494
    • /
    • 2005
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query.

  • PDF