• Title/Summary/Keyword: 공개소스

Search Result 265, Processing Time 0.033 seconds

Design and Implementation of Visitor Access Control System using Deep learning Face Recognition (딥러닝 얼굴인식 기술을 활용한 방문자 출입관리 시스템 설계와 구현)

  • Heo, Seok-Yeol;Kim, Kang Min;Lee, Wan-Jik
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.245-251
    • /
    • 2021
  • As the trend of steadily increasing the number of single or double household, there is a growing demand to see who is the outsider visiting the home during the free time. Various models of face recognition technology have been proposed through many studies, and Harr Cascade of OpenCV and Hog of Dlib are representative open source models. Among the two modes, Dlib's Hog has strengths in front of the indoor and at a limited distance, which is the focus of this study. In this paper, a face recognition visitor access system based on Dlib was designed and implemented. The whole system consists of a front module, a server module, and a mobile module, and in detail, it includes face registration, face recognition, real-time visitor verification and remote control, and video storage functions. The Precision, Specificity, and Accuracy according to the change of the distance threshold value were calculated using the error matrix with the photos published on the Internet, and compared with the results of previous studies. As a result of the experiment, it was confirmed that the implemented system was operating normally, and the result was confirmed to be similar to that reported by Dlib.

Implementation of Policy based In-depth Searching for Identical Entities and Cleansing System in LOD Cloud (LOD 클라우드에서의 연결정책 기반 동일개체 심층검색 및 정제 시스템 구현)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.67-77
    • /
    • 2018
  • This paper suggests that LOD establishes its own link policy and publishes it to LOD cloud to provide identity among entities in different LODs. For specifying the link policy, we proposed vocabulary set founded on RDF model as well. We implemented Policy based In-depth Searching and Cleansing(PISC for short) system that proceeds in-depth searching across LODs by referencing the link policies. PISC has been published on Github. LODs have participated voluntarily to LOD cloud so that degree of the entity identity needs to be evaluated. PISC, therefore, evaluates the identities and cleanses the searched entities to confine them to that exceed user's criterion of entity identity level. As for searching results, PISC provides entity's detailed contents which have been collected from diverse LODs and ontology customized to the content. Simulation of PISC has been performed on DBpedia's 5 LODs. We found that similarity of 0.9 of source and target RDF triples' objects provided appropriate expansion ratio and inclusion ratio of searching result. For sufficient identity of searched entities, 3 or more target LODs are required to be specified in link policy.

System for Real-time Vissage Certification (실시간 얼굴인식 시스템)

  • Lee, In-Seong;Hong, Young-Min;Song, Young-Cheol;Kim, Ji-Chan;Hong, Jeongn-Jo
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1997-1998
    • /
    • 2011
  • 범용적으로 쓰여지고 있는 id카드를 이용한 출입방식의 경우 카드 분실, 미소지시 또는 손상시 불편함을 초래하며 실질적인 보안의 효과를 기대하기에는 부족한 부분이 많은 실정이다. 또한 전국에 사업장을 가지고 있는 기업의 경우는 보안업체별 소스코드를 공개하지 않음에 따라 id카드를 통일하기 위하여 최초 설치 업체에 종속되는 문제점도 가지고 있다. 그리고 지문인식, 홍체인식 및 정맥인식 등은 출입통제시스템 자체의 단점과 더불어 이용자들의 불편함 그리고 정보수집에 따른 불쾌감을 발생하는 문제점을 가지고 있다. 이러한 단점을 극복할수 있는 얼굴인식 시스템의 경우 다양한 상황에서의 얼굴 검출 및 정보 처리등에 대한 문제점이 있어 정지화상이나 신분증에 화상데이타를 입력하여 비교하는 방법등에 대한 실용화가 많이 되어지고 있는 실정이나 이 역시 id카드가 없으면 출입이 허가되지 않는다는 문제점이 있다. 이러한 문제점을 극복하고 자연스러운 상태에서 인증 및 출입이 허가된다면 가장 이상적이고 경제적인 출입통제시스템 구축이 가능하므로 본 논문에서는 위 문제점에 대한 대안을 제시하고 증명을 통하여 현장에서 충분이 적용될 수 있음을 입증하고자 한다.

  • PDF

Design of Non-repudiation Module for Secure FTP Service (안전한 FTP 서비스를 위한 부인방지 모듈 설계)

  • 이원호;오명관;한군희
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.3
    • /
    • pp.150-154
    • /
    • 2003
  • This paper designs the secure FTP model which provides origin non-repudiation and receipt non-repudiation service that sender and recipient profit of each other to prevent the repudiated of transmission of message and which provides the delivery non-repudiation service to prevent the repudiated of file reception and fact of the transmission failure of an error from the network. The FTP model which is designed to use the GSS-API and in order to have compatibility from source level, with security service it provided the interface which is consistent, establishes the secure context which application client and application server for is safe the session key which overhead from opening to the public key system with efficient key use and it used it minimized.

  • PDF

Problems with Chinese Ideographs Search in Unicode and Solutions to Them (유니코드 한자 검색의 문제점 및 개선방안)

  • Lee, Jeong-hyeon
    • Informatization Policy
    • /
    • v.19 no.3
    • /
    • pp.50-63
    • /
    • 2012
  • This thesis is designed to analyze how the search for Chinese ideographs is done in Koreanology-related domestic databases, domestic library databases, domestic academic databases, and overseas library databases, with a view to identifying problems and suggesting solutions to them. The major reasons that impede Chinese ideographs search in Unicode are classified as 'multicode characters', 'simplified characters', and 'variant characters', and three characters are chosen as samples to describe the current practice. Thirteen Koreanology-related databases, five domestic library databases, five domestic academic databases and two overseas library databases are analyzed in terms of Chinese ideographs search. To support search for multicode characters, the open source of the Unicode consortium must be applied. To improve search for simplified and variant characters, a matching table must be standardized and proposed to the Unicode consortium.

  • PDF

A review of test method the Double-system Track side Functional Modules in High speed line (고속선로변 2중화 정보처리모듈 시험방안 고찰)

  • Chang, Seok-Gahk;Back, Seung-Koo
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.603-609
    • /
    • 2008
  • Nowadays, double-system of TFM(Track-side Functional Modules) developed instead of single-system in use of high speed line to acquisition more availability. Safety Law for Railroad recommend to quality certification of development and general railway machines. It is important to select metrics which form the bases for testing software products. A number of package software development part do not open source cords, so testing external characteristic vectors having relationship with metrics. In this paper, review the process for the TFM Point Modules, Universal Modules and Switchers, think about the test methode of circuit boards output performance by using TFM tester and Simulators.

  • PDF

A Study on Performance Evaluation of Secure Operating Systems (보안 운영체제의 성능 평가에 대한 연구)

  • Hong, Cheol-Ho;Ko, Young-Woong;Kim, Young-Pill;Shin, Yong-Nyu;Kim, Jeong-Nyu;Yoo, Chuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1163-1166
    • /
    • 2002
  • 일반적인 운영체제에 보안 기능을 강화하기 위하여 접근 통제, 침입 탐지 그리고 감사 및 추적 등과 같은 새로운 보안 기능이 계속해서 추가되고 있다. 추가된 보안 기능에 의해서 어느 정도 시스템 성능에 변화가 생기는지는 보안 운영체제를 도입하려는 사용자들에게 중요한 선택 기준이 되고 있다. 그러나 현재 개발되고 있는 다양한 보안 운영체제들이 어느 정도의 성능을 보여주고 있는지에 대한 분석 자료는 거의 없다. 본 논문에서는 잘 알려진 보안 운영체제를 대상으로 성능 측정 결과를 보이고 있으며, 오버헤드가 발생하는 주요 원인에 대해서 분석을 하고 있다. 분석에 사용된 보안 운영체제는 공개 소스에 기반한 SELinux 이며, 보안 운영체제를 분석하는데 사용한 벤치마크 툴은 유닉스 성능 분석에 널리 활용되고 있는 Imbench 이다. 본 논문에서 제시하는 실험결과는 보안 운영체제를 도입하려는 사용자들과 보안 운영체제를 개발하는 개발자들에게 유용한 정보로 사용될 수 있다.

  • PDF

Trend analysis and Classification of Linux distributions (리눅스 배포판의 분류 및 동향 분석)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.357-363
    • /
    • 2017
  • The Linux operating system, considered to be a subset of the UNIX operating system, is becoming the backbone of the enterprise server market and is seen as the key to building cloud computing and big data infrastructures. Linux has a variety of Linux distributions due to the fact that the source is open and anyone can freely modify and distribute it. First of all, Linux dominated the server market, the emergence of various distributions dominates the desktop and mobile operating system markets. In this paper, we examine the birth and history of Linux and classify and characterize various Linux distributions. The emergence of various Linux distributions will play a pivotal role in the Internet of Things and will further expand their power.

Design and Implementation of a 3D Graphic Acceleration Device Driver for Embedded Systems (임베디드 시스템을 위한 3차원 그래픽 가속 장치 구동기의 설계 및 구현)

  • Kim, Seong-Woo;Lee, Jung-Hwa;Lee, Jong-Min
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1209-1219
    • /
    • 2007
  • It is difficult to run 3D graphics based application on the embedded system with hardware constraints. Therefore, such a system must have a systematic infrastructure which can process various operations with respect to 3D graphics through any graphic acceleration module. In this paper, we present a method to implement 3D graphics acceleration device driver on Tiny X platform which provide an open source graphics windowing environment. The proposed method is to initialize the driver step by step so that the direct rendering infrastructure can use it properly. Moreover, we evaluated overall 3D graphics performance of an implemented driver through a simple but effective benchmark program.

  • PDF

Development and Its Applications of K-NRisk for Hydraulic Analysis of Water Supply System under Abnormal Conditions (비정상상황 관망 수리해석 SW K-NRisk 개발 및 적용)

  • Noh, Joon Woo;Yoo, Do Guen;Shin, Eun Her;Lee, Ho Min
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.271-271
    • /
    • 2017
  • 상수관망 수리해석 기법은 절점의 사용량 및 누수량을 기지의 값으로 고려하여 총 수요량이 모두 공급될 수 있다고 가정하여 해석하는 수요기반해석(Demand Driven Analysis, DDA)과 사용량과 누수량은 절점 압력수두에 의해 달라질 수 있어, 공급가능량 및 누수량과 절점의 압력수두 모두를 미지수로 고려하여 해석하는 수압기반해석(Pressure Driven Analysis, PDA)으로 구분될 수 있다. 본 연구에서는 수압기반사용량 모의(Pressure Dependent Demand, PDD)와 수압기반누수량 모의(Pressure Dependent Leakage, PDL)기능이 모두 구현되고, 다양한 시나리오 분석이 가능한 소프트웨어(SW)인 K-NRisk를 개발하였다. K-NRisk는 2016년 7월에 공개된 상수관망 해석범용모형인 EPANET3 소스코드 기반으로 개량 개발되었으며, 기존 EPANET2와 비교하였을 경우 사용자 편의성 증대를 위한 입출력 기능 및 SW 활용도 제고를 위한 대표업무분석 기능이 신규 개발, 강화되었다. 개발된 SW를 관망정비 및 공급안정성 확보 목적을 위한 수리해석 시 적용하여 그 결과를 분석하였다. 적용결과 기존 수요기반해석이 가지고 있는 한계점을 보완하고, 실제업무 시 활용가능함을 확인하였다.

  • PDF