• Title/Summary/Keyword: 개인 식별 시스템

Search Result 445, Processing Time 0.03 seconds

Experimental Study of System Identification for Seismic Response of Building Structure (건축구조물의 지진응답제어를 위한 시스템 식별의 실험적 연구)

  • 주석준;박지훈;민경원;홍성목
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.3 no.4
    • /
    • pp.47-60
    • /
    • 1999
  • The stability and efficiency of structural control systems depend on the accuracy of mathematical model of the system to be controlled. In this study, state equation models of a small scale test structure and an AMD(active mass damper) are obtained separately using OKID(observer/Kalman filter identification) which is a time domain system identification method. The test structure with each floor acceleration as outputs is identified for two inputs - the ground acceleration and the acceleration of the moving mass of AMD relative to the installation floor - individually and the two identified state equation models are integrated into one by model reduction method. The AMD is identified with the motor control signal as an input and the relative acceleration of the moving mass as an output, and it is shown that the identified model has large damping ratio and phase shift. The transfer functions and the time histories reconstructed from the identified models of the test model and the AMD match well with those measured from the experiment.

  • PDF

KISS Korea Computer Congress 2006 (RFID시스템에서 향상된 쿼리 트리 기반 충돌 알고리즘)

  • Han Jae-Il;Seo Hyun-Gon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.16-18
    • /
    • 2006
  • RFID는 RF신호를 이용하여 물체에 부착된 태그(tag)를 읽어 물체를 식별하는 비 접촉 인식 기술이다. RFID 리더의 식별영역에 여러 개의 태그가 있는 경우 이들 사이의 충돌(collision)이 발생되기 때문에 이들을 식별할 수 있는 메커니즘이 있어야 한다. 본 논문에서는 먼저 기존에 제안된 트리 기반 메모래스 충돌방지 알고리즘들을 살펴보고, 본 논문에서 제안하는 향상된 쿼리 기반 충돌 알고리즘(AQT : Advanced Query Tree based Collision Algorithm)을 소개한다.

  • PDF

U-건물 화재피난정보 시스템에 관한 연구

  • Jo, Won-Jun;No, Sam-Gyu
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.50-51
    • /
    • 2013
  • 화재발생시 기존의 비상경보설비는 화재경보라는 단순한 정보만을 제공함으로서 대피자의 입장에서는 건축물의 안전상황 및 피난상황을 식별할 수 없다. 따라서 화재발생시 대피자들이 밀집되는 병목현상이나 화재 영향에 노출되어 있는 피난경로로의 대피 등은 화재 피해를 가중시키고 있다. 본 연구의 목적은 현재 응용 가능한 대표적인 Ubiquitous 기술 중 개인의 위치를 식별하여 이용하는 위치인식기술 RSSI(Received Signal Strength Indication)을 활용한다. RSSI를 기반으로 한 LQI(Link Quality Indication)는 무선통신기간의 거리인식을 통해 대피자 정보 시스템 정보를 획득한다. 이러한 위치정보시스템을 응용하여 개발한 화재 안전 시스템은 화재 위치를 식별하고 화재위험 지역의 상황변화를 예측하여 피난경로 선정을 위한 안전정보를 제공하여 준다.

  • PDF

일회용 패스워드를 기반으로 한 인증 시스템에 대한 고찰

  • Kim, Ki-Young
    • Review of KIISC
    • /
    • v.17 no.3
    • /
    • pp.26-31
    • /
    • 2007
  • 공개된 네트워크 시스템 상에서의 개인 정보를 보호하기 위해 사용자 인증은 시스템 보안에 있어서 중요한 요소이다. 패스워드 기반의 인증 메커니즘은 비용과 효율성의 측면에서 널리 사용되고 있으며 최근 이중요소인증(Two-Factor Authentication)의 한 수단으로 일회용 패스워드(One-Time Password, OTP)를 도입하고 있다. 본고에서는 일회용 패스워드에 대한 인증 기술과 OTP 통합 인증 센터로 구성되는 OTP 통합 인증 시스템에 대해 검토하며 취약성에 대해 살펴보고 이에 대한 대응 방안으로 서비스 제공자의 식별자를 포함한 일회용 패스워드 생성 매체를 이용하는 사용자 인증 시스템을 구성한다. 또한 USB 토큰 형태의 일회용 패스워드 매체를 이용하여 다수의 서비스 제공자의 일회용 패스워드를 지원하는 인증 시스템을 제안한다.

A Practical Approach Defeating Blackmailing XTR-version Identification protocol (XTR 버전의 개인식별 프로토콜을 이용해 블랙메일링을 막는 실질적인 방법)

  • 한동국;박혜영;박영호;김창한;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.55-66
    • /
    • 2002
  • Electronic cash system based on anonymous coins have been invented by David Chaum. However, von Solms and Naccache discovered that such anonymous coins also very well suited to support criminals in Blacoailing. In this paper, we suggest a method that a client informs a bank of the information about blackmailing attack by using Schnorr identification protocol of XTR version at the stage of identification, whenever he is blackmailed. In general, blackmailing is the most serious among the various drawbacks of electronic cash system. Especially, blackmiling to be done when the client is kidnapped brings a fatal result to electronic cash system. But if the Schnorr identification protocol of XTR version is used, we can efficiently defeat blackmailing without assumption required in the existing method to defeat blackmailing.

Emotional Recognition System Using Eigenfaces (Eigenface를 이용한 인간의 감정인식 시스템)

  • Joo, Young-Hoon;Lee, Sang-Yun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.216-221
    • /
    • 2003
  • Emotions recognition is a topic on which little research has been done to date. This paper proposes a new method that can recognize the human s emotion from facial image by using eigenspace. To do so, first, we get the face image by using the skin color from the original color image acquired by CCD color camera. Second, we get the vector image which is projected the obtained face image into eigenspace. And then, we propose the method for finding out each person s identification and emotion from the weight of vector image. Finally, we show the practical application possibility of the proposed method through the experiment.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

A Sensor Identification Scheme for Dynamic Interworking Between Personal Sensor Devices and a Smartphone (개인용 센서 기기와 스마트폰의 동적 연동을 위한 센서 식별 기법)

  • Min, Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2016
  • Several sensor devices have been developed for monitoring individual's health and status information and services which visualize customized information by associating applications running on smartphones with sensor devices also have been emerged. Though these applications provide similar information to a user, each sensor device has its own application caused by non-standardized packet formats. In this paper, we propose a sensor device identification for dynamic interworking between a smartphone and personal sensor devices. In the proposed scheme, we can use the same application which plays role of a client on the smartphone as changing sensor devices because server stores packet information of sensor devices.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.