• Title/Summary/Keyword: 데이터베이스 사전

Search Result 324, Processing Time 0.033 seconds

Robust Orientation Estimation Algorithm of Fingerprint Images (노이즈에 강인한 지문 융선의 방향 추출 알고리즘)

  • Lee, Sang-Hoon;Lee, Chul-Han;Choi, Kyoung-Taek;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.55-63
    • /
    • 2008
  • Ridge orientations of fingerprint image are crucial informations in many parts of fingerprint recognition such as enhancement, matching and classification. Therefore it is essential to extract the ridge orientations of image accurately because it directly affects the performance of the system. The two main properties of ridge orientation are 1) global characteristic(gradual change in whole part of fingerprint) and 2) local characteristic(abrupt change around core and delta points). When we only consider the local characteristic, estimated ridge orientations are well around singular points but not robust to noise. When the global characteristic is only considered, to estimate ridge orientation is robust to noise but cannot represent the orientation around singular points. In this paper, we propose a novel method for estimating ridge orientation which represents local characteristic specifically as well as be robust to noise. We reduce the noise caused by scar using iterative outlier rejection. We apply adaptive measurement resolution in each fingerprint area to estimate the ridge orientation around singular points accurately. We evaluate the performance of proposed method using synthetic fingerprint and FVC 2002 DB. We compare the accuracy of ridge orientation. The performance of fingerprint authentication system is evaluated using FVC 2002 DB.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Vector-Based Data Augmentation and Network Learning for Efficient Crack Data Collection (효율적인 균열 데이터 수집을 위한 벡터 기반 데이터 증강과 네트워크 학습)

  • Kim, Jong-Hyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • In this paper, we propose a vector-based augmentation technique that can generate data required for crack detection and a ConvNet(Convolutional Neural Network) technique that can learn it. Detecting cracks quickly and accurately is an important technology to prevent building collapse and fall accidents in advance. In order to solve this problem with artificial intelligence, it is essential to obtain a large amount of data, but it is difficult to obtain a large amount of crack data because the situation for obtaining an actual crack image is mostly dangerous. This problem of database construction can be alleviated with elastic distortion, which increases the amount of data by applying deformation to a specific artificial part. In this paper, the improved crack pattern results are modeled using ConvNet. Rather than elastic distortion, our method can obtain results similar to the actual crack pattern. By designing the crack data augmentation based on a vector, rather than the pixel unit used in general data augmentation, excellent results can be obtained in terms of the amount of crack change. As a result, in this paper, even though a small number of crack data were used as input, a crack database can be efficiently constructed by generating various crack directions and patterns.

Evaluation of Hydrogeological Characteristics of Deep-Depth Rock Aquifer in Volcanic Rock Area (화산암 지역 고심도 암반대수층 수리지질특성 평가)

  • Hangbok Lee;Chan Park;Junhyung Choi;Dae-Sung Cheon;Eui-Seob Park
    • Tunnel and Underground Space
    • /
    • v.34 no.3
    • /
    • pp.231-247
    • /
    • 2024
  • In the field of high-level radioactive waste disposal targeting deep rock environments, hydraulic characteristic information serves as the most important key factor in selecting relevant disposal sites, detailed design of disposal facilities, derivation of optimal construction plans, and safety evaluation during operation. Since various rock types are mixed and distributed in a small area in Korea, it is important to conduct preliminary work to analyze the hydrogeological characteristics of rock aquifers for various rock types and compile the resulting data into a database. In this paper, we obtained hydraulic conductivity data, which is the most representative field hydraulic characteristic of a high-depth volcanic bedrock aquifer, and also analyzed and evaluated the field data. To acquire field data, we used a high-performance hydraulic testing system developed in-house and applied standardized test methods and investigation procedures. In the process of hydraulic characteristic data analysis, hydraulic conductivity values were obtained for each depth, and the pattern of groundwater flow through permeable rock joints located in the test section was also evaluated. It is expected that the series of data acquisition methods, procedures, and analysis results proposed in this report can be used to build a database of hydraulic characteristics data for high-depth rock aquifers in Korea. In addition, it is expected that it will play a role in improving technical know-how to be applied to research on hydraulic characteristic according to various bedrock types in the future.

An Implementation of Embedded Speaker Identifier for PDA (PDA를 위한 내장형 화자인증기의 구현)

  • Kim, Dong-Ju;Roh, Yong-Wan;Kim, Dong-Gyu;Chung, Kwang-Woo;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.286-289
    • /
    • 2005
  • 기존의 물리적 인증도구를 이용한 방식이나 패스워드 인증 방식은 분실, 도난, 해킹 등에 취약점을 가지고 있다. 따라서 지문, 서명, 홍채, 음성, 얼굴 등을 이용한 생체 인식기술을 보안 기술로 적용하려는 연구가 진행중이며 일부는 실용화도 되고 있다. 본 논문에서는 최근 널리 보급되어 있는 임베디드 시스템중의 하나인 PDA에 음성 기술을 이용한 내장형 화자 인증기를 구현하였다. 화자 인증기는 음성기술에서 널리 사용되고 있는 벡터 양자화 기술과 은닉 마코프 모델 기술을 사용하였으며, PDA의 하드웨어적인 제약 사항을 고려하여 사용되는 벡터 코드북을 두 가지로 다르게 하여 각각 구현하였다. 처음은 코드북을 화자 등록시에 발성음만을 이용하여 생성하고 화자인증 시에 이용하는 방법이며, 다른 하나는 대용량의 음성 데이터베이스를 이용하여 코드북을 사전에 생성하여 이를 화자 인증시에 이용하는 방법이다. 화자인증기의 성능평가는 5명의 화자가 10번씩 5개의 단어에 대하여 실험하여, 각각 화자종속 코득북을 이용한 인증기는 88.8%, 99.5%, 화자독립 코드북을 이용한 인증기는 85.6%, 95.5%의 인증율과 거절율을 보였으며, 93.5%와 90.0%의 평균 확률을 보였다.. 실험을 통하여 화자독립 인증기의 경우가 화자종속 인증기의 경우보다 낮은 인식율을 보였지만, 화자종속 인증기에서 나타나는 코드북 훈련시에 발생하는 메모리 문제를 해결 할 수 있었다.

  • PDF

Semantic Event Detection and Summary for TV Golf Program Using MPEG-7 Descriptors (MPEG-7 기술자를 이용한 TV 골프 프로그램의 이벤트검출 및 요약)

  • 김천석;이희경;남제호;강경옥;노용만
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.96-106
    • /
    • 2002
  • We introduce a novel scheme to characterize and index events in TV golf programs using MPEG-7 descriptors. Our goal is to identify and localize the golf events of interest to facilitate highlight-based video indexing and summarization. In particular, we analyze multiple (low-level) visual features using domain-specific model to create a perceptual relation for semantically meaningful(high-level) event identification. Furthermore, we summarize a TV golf program with TV-Anytime segmentation metadata, a standard form of an XML-based metadata description, in which the golf events are represented by temporally localized segments and segment groups of highlights. Experimental results show that our proposed technique provides reasonable performance for identifying a variety of golf events.

A Study on Systematic Review of Learning with a Robot (로봇활용교육의 체계적 문헌고찰에 관한 연구)

  • Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.2
    • /
    • pp.199-209
    • /
    • 2013
  • The study is to review the effects of learning with a robot among regular courses of elementary and middle schools so that the research method of systematic review for papers from 2001 and 2013 was conducted. The database for review were KISS, DBpia, and E-article and it was searched with two options of 'robot & education' and 'learning with a robot'. Initially, 481 papers were searched; but finally 50 were selected after monitoring and extraction execution in line with protocol. Great volume of researches focused on academic skill such as a creativity, problem solving skills and as for research methods, Pretest-Posttest Control Group Design and t-test took the lion's share. As for educational effects, improvements of course interest, immersion, attitude, motivation, creativeness and problem solving skills were identified; but in some researches, insignificant research outcomes were reported. Based on analysis results, considerations for learning with a robot were suggested.

  • PDF

Sell-modeling of Cylindrical Object based on Generic Model for 3D Object Recognition (3 차원 물체 인식을 위한 보편적 지식기반 실린더형 물체 자가모델링 기법)

  • Baek, Kyeong-Keun;Park, Yeon-Chool;Park, Joon-Young;Lee, Suk-Han
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.210-214
    • /
    • 2008
  • It is actually impossible to model and store all objects which exist in real home environment into robot's database in advance. To resolve this problem, this paper proposes new object modeling method that can be available for robot self-modeling, which is capable of estimating whole model's shape from partial surface data using Generic Model. And this whole produce is conducted to cylindrical objects like cup, bottles and cans which can be easily found at indoor environment. The detailed process is firstly we obtain cylinder's initial principle axis using points coordinates and normal vectors from object's surface after we separate cylindrical object from 3D image. This 3D image is obtained from 3D sensor. And second, we compensate errors in the principle axis repeatedly. Then finally, we do modeling whole cylindrical object using cross sectional principal axis and its radius To show the feasibility of the algorithm, We implemented it and evaluated its accuracy.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

An Analysis of Physicians' Online Information Search Process at the Point of Care (의사의 임상질문 해결을 위한 온라인 정보검색과정 연구)

  • Kim, Soon;Chung, EunKyung
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.3
    • /
    • pp.177-193
    • /
    • 2016
  • This study aims to analyze physicians' online information search process to solve the clinical questions at the point of care. To achieve this purpose, ten university hospital-based physicians participated in-depth interviews and observation studies. Based on Wilson's problem solving process, this study analyzed the characteristics of each information search stage and efficiency of online searching. The results showed that participants tend to relatively immediately formulate their clinical questions. However, basic searching strategies were only used and a few preferred information sources were chosen. However, average satisfaction degree of online searching appeared high with 5.7 (7 Likert-scale) and problem-solving index increased after searching. As physicians are likely to use well organized and evidenced-based credible information easily, it implies the needs for an integrated search system within the electronic medical record (EMR). In addition, as other online resources' awareness is lower comparing Google and PubMed, active promotions and training of other resources are needed.